Mitigating security risks through attack strategies exploration
Security assessment of organization's information systems is becoming increasingly
complex due to their growing sizes and underlying architectures, eg, cloud. Analyzing …
complex due to their growing sizes and underlying architectures, eg, cloud. Analyzing …
Toward smarter vulnerability discovery using machine learning
G Grieco, A Dinaburg - Proceedings of the 11th ACM Workshop on …, 2018 - dl.acm.org
A Cyber Reasoning System (CRS) is designed to automatically find and exploit software
vulnerabilities in complex software. To be effective, CRSs integrate multiple vulnerability …
vulnerabilities in complex software. To be effective, CRSs integrate multiple vulnerability …
Practical machine learning for cloud intrusion detection: Challenges and the way forward
RSS Kumar, A Wicker, M Swann - … of the 10th ACM workshop on artificial …, 2017 - dl.acm.org
Operationalizing machine learning based security detections is extremely challenging,
especially in a continuously evolving cloud environment. Conventional anomaly detection …
especially in a continuously evolving cloud environment. Conventional anomaly detection …
Hacking goals: A goal-centric attack classification framework
Attack classification does represent a crucial activity in different security areas. During
security assessment, it makes it easier to define which attacks must be performed. When …
security assessment, it makes it easier to define which attacks must be performed. When …
AppMine: Behavioral analytics for web application vulnerability detection
Web applications in widespread use have always been the target of large-scale attacks,
leading to massive disruption of services and financial loss, as in the Equifax data breach. It …
leading to massive disruption of services and financial loss, as in the Equifax data breach. It …
Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities
Algorithmic Complexity (AC) Denial-of-Service attacks have been a threat for over twenty
years. Attackers craft particular input vectors to trigger the worst-case logic of some code …
years. Attackers craft particular input vectors to trigger the worst-case logic of some code …
Benchmarking Software Vulnerability Detection Techniques: A Survey
Y Bi, J Huang, P Liu, L Wang - arXiv preprint arXiv:2303.16362, 2023 - arxiv.org
Software vulnerabilities can have serious consequences, which is why many techniques
have been proposed to defend against them. Among these, vulnerability detection …
have been proposed to defend against them. Among these, vulnerability detection …
A hybrid scoring system for prioritization of software vulnerabilities
While security experts, firms, security providers, threat analysts all around the globe are
working hard to provide ironclad security for information system softwares, vulnerabilities in …
working hard to provide ironclad security for information system softwares, vulnerabilities in …
Revealing injection vulnerabilities by leveraging existing tests
Code injection attacks, like the one used in the high-profile 2017 Equifax breach, have
become increasingly common, now ranking# 1 on OWASP's list of critical web application …
become increasingly common, now ranking# 1 on OWASP's list of critical web application …
Leveraging secdevops to tackle the technical debt associated with cybersecurity attack tactics
C Izurieta, M Prouty - 2019 IEEE/ACM International Conference …, 2019 - ieeexplore.ieee.org
Context: Managing technical debt (TD) associated with external cybersecurity attacks on an
organization can significantly improve decisions made when prioritizing which security …
organization can significantly improve decisions made when prioritizing which security …