Detecting Overfitting of Machine Learning Techniques for Automatic Vulnerability Detection

N Risse - Proceedings of the 31st ACM Joint European Software …, 2023 - dl.acm.org
Recent results of machine learning for automatic vulnerability detection have been very
promising indeed: Given only the source code of a function f, models trained by machine …

Learning to Locate and Describe Vulnerabilities

J Zhang, S Liu, X Wang, T Li… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Automatically discovering software vulnerabilities is a long-standing pursuit for software
developers and security analysts. Since detection tools usually provide limited information …

Security Risk Assessment on Cloud: A Systematic Mapping Study

G Annunziata, A Sheykina, F Palomba… - Proceedings of the 28th …, 2024 - dl.acm.org
Cloud computing has become integral to modern organizational operations, offering
efficiency and agility. However, security challenges such as data loss and downtime …

[PDF][PDF] A cybersecurity dataset derived from the national collegiate penetration testing competition

N Munaiah, J Pelletier, SH Su, S Yang… - HICSS Symposium on …, 2019 - researchgate.net
Developers, and administrators, can benefit from inculcating an attacker mindset to
foreshadow potential security flaws is software systems as they are developed and/or …

Automated vulnerability testing via executable attack graphs

D Malzahn, Z Birnbaum… - … Conference on Cyber …, 2020 - ieeexplore.ieee.org
Cyber risk assessments are an essential process for analyzing and prioritizing security
issues. Unfortunately, many risk assessment methodologies are marred by human …

Beyond heuristics: learning to classify vulnerabilities and predict exploits

M Bozorgi, LK Saul, S Savage… - Proceedings of the 16th …, 2010 - dl.acm.org
The security demands on modern system administration are enormous and getting worse.
Chief among these demands, administrators must monitor the continual ongoing disclosure …

A proposed framework for proactive vulnerability assessments in cloud deployments

KA Torkura, F Cheng, C Meinel - 2015 10th International …, 2015 - ieeexplore.ieee.org
Vulnerability scanners are deployed in computer networks and software to timely identify
security flaws and misconfigurations. However, cloud computing has introduced new attack …

[PDF][PDF] Nemesis: Automated architecture for threat modeling and risk assessment for cloud computing

P Kamongi… - Proc. 6th ASE …, 2014 - computerscience.engineering.unt …
It is critical to ask and address the following type of questions, both as a cloud computing
architect who has designed and deployed a public, or private, or hybrid cloud; or a user who …

Towards automated assessment of vulnerability exposures in security operations

P Huff, Q Li - Security and Privacy in Communication Networks: 17th …, 2021 - Springer
Current approaches for risk analysis of software vulnerabilities using manual assessment
and numeric scoring do not complete fast enough to keep pace with the maintenance work …

A Historical and Statistical Studyof the Software Vulnerability Landscape

A Gueye, P Mell - arXiv preprint arXiv:2102.01722, 2021 - arxiv.org
Understanding the landscape of software vulnerabilities is key for developing effective
security solutions. Fortunately, the evaluation of vulnerability databases that use a …