Mitigating security risks through attack strategies exploration

BL Mediouni, A Nouri, M Bozga, A Legay… - … Applications of Formal …, 2018 - Springer
Security assessment of organization's information systems is becoming increasingly
complex due to their growing sizes and underlying architectures, eg, cloud. Analyzing …

Toward smarter vulnerability discovery using machine learning

G Grieco, A Dinaburg - Proceedings of the 11th ACM Workshop on …, 2018 - dl.acm.org
A Cyber Reasoning System (CRS) is designed to automatically find and exploit software
vulnerabilities in complex software. To be effective, CRSs integrate multiple vulnerability …

Practical machine learning for cloud intrusion detection: Challenges and the way forward

RSS Kumar, A Wicker, M Swann - … of the 10th ACM workshop on artificial …, 2017 - dl.acm.org
Operationalizing machine learning based security detections is extremely challenging,
especially in a continuously evolving cloud environment. Conventional anomaly detection …

Hacking goals: A goal-centric attack classification framework

F Caturano, G Perrone, SP Romano - … and Systems: 32nd IFIP WG 6.1 …, 2020 - Springer
Attack classification does represent a crucial activity in different security areas. During
security assessment, it makes it easier to define which attacks must be performed. When …

AppMine: Behavioral analytics for web application vulnerability detection

I Jana, A Oprea - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
Web applications in widespread use have always been the target of large-scale attacks,
leading to massive disruption of services and financial loss, as in the Equifax data breach. It …

Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities

Y Liu, W Meng - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
Algorithmic Complexity (AC) Denial-of-Service attacks have been a threat for over twenty
years. Attackers craft particular input vectors to trigger the worst-case logic of some code …

Benchmarking Software Vulnerability Detection Techniques: A Survey

Y Bi, J Huang, P Liu, L Wang - arXiv preprint arXiv:2303.16362, 2023 - arxiv.org
Software vulnerabilities can have serious consequences, which is why many techniques
have been proposed to defend against them. Among these, vulnerability detection …

A hybrid scoring system for prioritization of software vulnerabilities

A Sharma, S Sabharwal, S Nagpal - Computers & Security, 2023 - Elsevier
While security experts, firms, security providers, threat analysts all around the globe are
working hard to provide ironclad security for information system softwares, vulnerabilities in …

Revealing injection vulnerabilities by leveraging existing tests

K Hough, G Welearegai, C Hammer, J Bell - Proceedings of the ACM …, 2020 - dl.acm.org
Code injection attacks, like the one used in the high-profile 2017 Equifax breach, have
become increasingly common, now ranking# 1 on OWASP's list of critical web application …

Leveraging secdevops to tackle the technical debt associated with cybersecurity attack tactics

C Izurieta, M Prouty - 2019 IEEE/ACM International Conference …, 2019 - ieeexplore.ieee.org
Context: Managing technical debt (TD) associated with external cybersecurity attacks on an
organization can significantly improve decisions made when prioritizing which security …