R-TF-025-005 Security Risk Testing Report
Instructions
Provide a link to the security risk testing report, which should have the following sections:
- Introduction: This section sets the stage by providing background information and defining the boundaries of the analysis.
- Methodology: This outlines the approach taken for the analysis, including the tools used.
- Synthesis: This section presents a summary of the findings, including the results of penetration tests, a breakdown of vulnerabilities found, and a table detailing these vulnerabilities.
- Description of the report: This section likely elaborates on the vulnerabilities identified and provides recommendations for remediation.
- Static Analysis: This part focuses on the security analysis of the Android application itself and its source code without executing it.
- Dynamic Analysis: This section covers the analysis of the application and its environment while it is running, looking at the Android application attack surface, process filesystem, process memory, and DICOM manipulation.
- Attacks on models: This suggests an analysis or testing of security related to data models, potentially machine learning models, within the system.
- Penetration test results: This section likely provides detailed results from the penetration testing, specifically mentioning a vulnerable dependency (DCMTK) and Android app code obfuscation.
Signature meaning
The signatures for the approval process of this document can be found in the verified commits at the repository for the QMS. As a reference, the team members who are expected to participate in this document and their roles in the approval process, as defined in Annex I Responsibility Matrix
of the GP-001
, are:
- Author: Team members involved
- Reviewer: JD-003, JD-004
- Approver: JD-001