Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers common vulnerabilities in web and software applications, such as broken access control, cryptographic failures, injection flaws, insecure design, and security misconfigurations. It explains the impact of attacker-controlled data, the OWASP Top 10 project, and defense strategies like DEP, ASLR, and stack canaries.