Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.

Well done!

You have completed (UPI) Chapter 12: Threat Detection and Defense Techniques!

Instruction

12.3.1 Benchmark Selection

In this section, we present a new, repeatable methodology to combine, compare, and rank the SAST, DAST, and IAST tool combinations (see Figure 1). Select the OWASP Benchmark project. Select the SAST, DAST, and IAST tools. In this concrete instantiation of the methodology, we choose six commercial and open-source tools according to the analysis of related works in Section 2.3 and official lis...