Detecting Overfitting of Machine Learning Techniques for Automatic Vulnerability Detection
N Risse - Proceedings of the 31st ACM Joint European Software …, 2023 - dl.acm.org
Recent results of machine learning for automatic vulnerability detection have been very
promising indeed: Given only the source code of a function f, models trained by machine …
promising indeed: Given only the source code of a function f, models trained by machine …
Learning to Locate and Describe Vulnerabilities
Automatically discovering software vulnerabilities is a long-standing pursuit for software
developers and security analysts. Since detection tools usually provide limited information …
developers and security analysts. Since detection tools usually provide limited information …
Security Risk Assessment on Cloud: A Systematic Mapping Study
G Annunziata, A Sheykina, F Palomba… - Proceedings of the 28th …, 2024 - dl.acm.org
Cloud computing has become integral to modern organizational operations, offering
efficiency and agility. However, security challenges such as data loss and downtime …
efficiency and agility. However, security challenges such as data loss and downtime …
[PDF][PDF] A cybersecurity dataset derived from the national collegiate penetration testing competition
Developers, and administrators, can benefit from inculcating an attacker mindset to
foreshadow potential security flaws is software systems as they are developed and/or …
foreshadow potential security flaws is software systems as they are developed and/or …
Automated vulnerability testing via executable attack graphs
D Malzahn, Z Birnbaum… - … Conference on Cyber …, 2020 - ieeexplore.ieee.org
Cyber risk assessments are an essential process for analyzing and prioritizing security
issues. Unfortunately, many risk assessment methodologies are marred by human …
issues. Unfortunately, many risk assessment methodologies are marred by human …
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse.
Chief among these demands, administrators must monitor the continual ongoing disclosure …
Chief among these demands, administrators must monitor the continual ongoing disclosure …
A proposed framework for proactive vulnerability assessments in cloud deployments
Vulnerability scanners are deployed in computer networks and software to timely identify
security flaws and misconfigurations. However, cloud computing has introduced new attack …
security flaws and misconfigurations. However, cloud computing has introduced new attack …
[PDF][PDF] Nemesis: Automated architecture for threat modeling and risk assessment for cloud computing
P Kamongi… - Proc. 6th ASE …, 2014 - computerscience.engineering.unt …
It is critical to ask and address the following type of questions, both as a cloud computing
architect who has designed and deployed a public, or private, or hybrid cloud; or a user who …
architect who has designed and deployed a public, or private, or hybrid cloud; or a user who …
Towards automated assessment of vulnerability exposures in security operations
Current approaches for risk analysis of software vulnerabilities using manual assessment
and numeric scoring do not complete fast enough to keep pace with the maintenance work …
and numeric scoring do not complete fast enough to keep pace with the maintenance work …
A Historical and Statistical Studyof the Software Vulnerability Landscape
Understanding the landscape of software vulnerabilities is key for developing effective
security solutions. Fortunately, the evaluation of vulnerability databases that use a …
security solutions. Fortunately, the evaluation of vulnerability databases that use a …