Identifying vulnerabilities using internet-wide scanning data

J O'Hare, R Macfarlane, O Lo - 2019 IEEE 12th International …, 2019 - ieeexplore.ieee.org
Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect
active reconnaissance results for online devices. Access to this information is provided …

Limits of machine learning for automatic vulnerability detection

N Risse, M Böhme - arXiv preprint arXiv:2306.17193, 2023 - arxiv.org
Recent results of machine learning for automatic vulnerability detection have been very
promising indeed: Given only the source code of a function $ f $, models trained by machine …

{Large-Scale} Evaluation of a Vulnerability Analysis Framework

NS Evans, A Benameur, M Elder - 7th Workshop on Cyber Security …, 2014 - usenix.org
Ensuring that exploitable vulnerabilities do not exist in a piece of software written using type-
unsafe languages (eg, C/C++) is still a challenging, largely unsolved problem. Current …

[PDF][PDF] REVS: A Vulnerability Ranking Tool for Enterprise Security.

I Forain, R de Oliveira Albuquerque… - ICEIS (2), 2022 - ppee.unb.br
Information security incidents currently affect organizations worldwide. In 2021, thousands of
companies suffered cyber attacks, resulting in billions of dollars in losses. Most of these …

Automated CVE Analysis for Threat Prioritization and Impact Prediction

E Aghaei, E Al-Shaer, W Shadid, X Niu - arXiv preprint arXiv:2309.03040, 2023 - arxiv.org
The Common Vulnerabilities and Exposures (CVE) are pivotal information for proactive
cybersecurity measures, including service patching, security hardening, and more. However …

Threatzoom: CVE2CWE using hierarchical neural network

E Aghaei, W Shadid, E Al-Shaer - arXiv preprint arXiv:2009.11501, 2020 - arxiv.org
The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing
publicly known information security vulnerabilities. One or more CVEs are grouped into the …

CADS-ML/DL: efficient cloud-based multi-attack detection system

S Farhat, M Abdelkader, A Meddeb-Makhlouf… - International Journal of …, 2023 - Springer
With the increasing adoption of cloud computing, securing cloud-based systems and
applications has become a critical concern for almost every organization. Traditional security …

mvulpreter: A multi-granularity vulnerability detection system with interpretations

D Zou, Y Hu, W Li, Y Wu, H Zhao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Due to the powerful automatic feature extraction, deep learning-based vulnerability
detection methods have evolved significantly in recent years. However, almost all current …

Scoring cyber vulnerabilities based on their impact on organizational goals

O Keskin, N Gannon, B Lopez… - 2021 Systems and …, 2021 - ieeexplore.ieee.org
Vulnerability Management, which is a vital part of risk and resiliency management efforts, is
a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on …

[HTML][HTML] A CNN-based automatic vulnerability detection

JH An, Z Wang, I Joe - EURASIP Journal on Wireless Communications …, 2023 - Springer
With the advent of the Internet, the activities of individuals and businesses have expanded
into the online realm. As a result, vulnerabilities that result in actual breaches can lead to …