Vulnerability prioritization: An offensive security approach

MF Bulut, A Adebayo, D Sow, S Ocepek - arXiv preprint arXiv:2206.11182, 2022 - arxiv.org
Organizations struggle to handle sheer number of vulnerabilities in their cloud
environments. The de facto methodology used for prioritizing vulnerabilities is to use …

Autocvss: An approach for automatic assessment of vulnerability severity based on attack process

D Zou, J Yang, Z Li, H Jin, X Ma - … , GPC 2019, Uberlândia, Brazil, May 26 …, 2019 - Springer
Vulnerability severity assessment is an important research problem. Common Vulnerability
Scoring System (CVSS) has been widely used to quantitatively assess the vulnerability …

Attack techniques and threat identification for vulnerabilities

C Adam, MF Bulut, D Sow, S Ocepek, C Bedell… - arXiv preprint arXiv …, 2022 - arxiv.org
Modern organizations struggle with insurmountable number of vulnerabilities that are
discovered and reported by their network and application vulnerability scanners. Therefore …

Normalization Framework for Vulnerability Risk Management in Cloud

V Ahmadi, P Arlos, E Casalicchio - 2021 8th International …, 2021 - ieeexplore.ieee.org
Vulnerability Risk Management (VRM) is a critical element in cloud security that directly
impacts cloud providers' security assurance levels. Today, VRM is a challenging process …

A review of penetration testing and vulnerability assessment in cloud environment

I Yurtseven, S Bagriyanik - 2020 Turkish National Software …, 2020 - ieeexplore.ieee.org
Cloud computing continues to provide easy, flexible, and cost-effective solutions and
services to both enterprises and unprofessional users. Many small and large-scale …

Risk prioritization by leveraging latent vulnerability features in a contested environment

K Alperin, A Wollaber, D Ross, P Trepagnier… - Proceedings of the 12th …, 2019 - dl.acm.org
Cyber network defenders face an overwhelming volume of software vulnerabilities.
Resource limitations preclude them mitigating all but a small number of vulnerabilities on an …

VulANalyzeR: Explainable binary vulnerability detection with multi-task learning and attentional graph convolution

L Li, SHH Ding, Y Tian, BCM Fung, P Charland… - ACM Transactions on …, 2023 - dl.acm.org
Software vulnerabilities have been posing tremendous reliability threats to the general
public as well as critical infrastructures, and there have been many studies aiming to detect …

A framework for designing vulnerability metrics

M Albanese, I Iganibo, O Adebiyi - Computers & Security, 2023 - Elsevier
Vulnerability analysis has long been used to evaluate the security posture of a system.
Different approaches, including vulnerability graphs and various vulnerability metrics, have …

Toward large-scale vulnerability discovery using machine learning

G Grieco, GL Grinblat, L Uzal, S Rawat, J Feist… - Proceedings of the sixth …, 2016 - dl.acm.org
With sustained growth of software complexity, finding security vulnerabilities in operating
systems has become an important necessity. Nowadays, OS are shipped with thousands of …

Design and Implementation of a Threat-Specific Security Risk Assessment Tool

A Nhlabatsi, A Hussein, N Fetais… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Security threats posed to individual cloud computing clients vary depending on their specific
security requirements. However, Cloud Providers apply generic security risk assessment …