SVN-438

Ethical hacking and security audits

Research in ethical hacking starts from the premise that the researcher plays the role of a network team, that is, the role of an attacker on the network or in a system. From this perspective, this line of research pursues the following objectives:

  • Investigation of new vulnerabilities (zero day) in software through manual inspection and fuzzing techniques.
  • Investigation of network attack techniques, applied to emerging technologies and different scenarios: 5G, SDN, IoT, Blockchain, network support services (eg DNS, directories).
  • Development of innovative fuzzing techniques to discover software vulnerabilities.Development of mechanisms and tools for the automation of security attacks.
  • Research on exploit development techniques and their mitigation.

Form

Collaboration request

  • Full name.

  • Introduzca su correo electrónico

  • Write a contact phone.

  • Write your comments here.

  • aviso legal

Map

X
-3.6270236995 37.1952071956 -3.6230236995 37.1992071956 1
6028 /cms/places/merengue_content_info/74/6028/?lang=en 37.1972071956 -3.6250236995 Ethical hacking and security audits /media/merengue/img/map/default_map_icon.png 1