Vulnerability prioritization: An offensive security approach
Organizations struggle to handle sheer number of vulnerabilities in their cloud
environments. The de facto methodology used for prioritizing vulnerabilities is to use …
environments. The de facto methodology used for prioritizing vulnerabilities is to use …
Autocvss: An approach for automatic assessment of vulnerability severity based on attack process
Vulnerability severity assessment is an important research problem. Common Vulnerability
Scoring System (CVSS) has been widely used to quantitatively assess the vulnerability …
Scoring System (CVSS) has been widely used to quantitatively assess the vulnerability …
Attack techniques and threat identification for vulnerabilities
C Adam, MF Bulut, D Sow, S Ocepek, C Bedell… - arXiv preprint arXiv …, 2022 - arxiv.org
Modern organizations struggle with insurmountable number of vulnerabilities that are
discovered and reported by their network and application vulnerability scanners. Therefore …
discovered and reported by their network and application vulnerability scanners. Therefore …
Normalization Framework for Vulnerability Risk Management in Cloud
Vulnerability Risk Management (VRM) is a critical element in cloud security that directly
impacts cloud providers' security assurance levels. Today, VRM is a challenging process …
impacts cloud providers' security assurance levels. Today, VRM is a challenging process …
A review of penetration testing and vulnerability assessment in cloud environment
I Yurtseven, S Bagriyanik - 2020 Turkish National Software …, 2020 - ieeexplore.ieee.org
Cloud computing continues to provide easy, flexible, and cost-effective solutions and
services to both enterprises and unprofessional users. Many small and large-scale …
services to both enterprises and unprofessional users. Many small and large-scale …
Risk prioritization by leveraging latent vulnerability features in a contested environment
Cyber network defenders face an overwhelming volume of software vulnerabilities.
Resource limitations preclude them mitigating all but a small number of vulnerabilities on an …
Resource limitations preclude them mitigating all but a small number of vulnerabilities on an …
VulANalyzeR: Explainable binary vulnerability detection with multi-task learning and attentional graph convolution
Software vulnerabilities have been posing tremendous reliability threats to the general
public as well as critical infrastructures, and there have been many studies aiming to detect …
public as well as critical infrastructures, and there have been many studies aiming to detect …
A framework for designing vulnerability metrics
Vulnerability analysis has long been used to evaluate the security posture of a system.
Different approaches, including vulnerability graphs and various vulnerability metrics, have …
Different approaches, including vulnerability graphs and various vulnerability metrics, have …
Toward large-scale vulnerability discovery using machine learning
With sustained growth of software complexity, finding security vulnerabilities in operating
systems has become an important necessity. Nowadays, OS are shipped with thousands of …
systems has become an important necessity. Nowadays, OS are shipped with thousands of …
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
Security threats posed to individual cloud computing clients vary depending on their specific
security requirements. However, Cloud Providers apply generic security risk assessment …
security requirements. However, Cloud Providers apply generic security risk assessment …