A Survey on Software Vulnerability Exploitability Assessment
S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …
Enhancing Vulnerability prioritization: Data-driven exploit predictions with community-driven insights
The number of disclosed vulnerabilities has been steadily increasing over the years. At the
same time, organizations face significant challenges patching their systems, leading to a …
same time, organizations face significant challenges patching their systems, leading to a …
No one drinks from the firehose: How organizations filter and prioritize vulnerability information
S de Smale, R van Dijk, X Bouwman… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The number of published software vulnerabilities is increasing every year. How do
organizations stay in control of their attack surface despite their limited staff resources? Prior …
organizations stay in control of their attack surface despite their limited staff resources? Prior …
Licality—likelihood and criticality: Vulnerability risk prioritization through logical reasoning and deep learning
Security and risk assessment aims to prioritize detected vulnerabilities for remediation in a
computer networking system. The widely used expert-based risk prioritization approach, eg …
computer networking system. The widely used expert-based risk prioritization approach, eg …
An environment-specific prioritization model for information-security vulnerabilities based on risk factor analysis
Vulnerabilities represent a constant and growing risk for organizations. Their successful
exploitation compromises the integrity and availability of systems. The use of specialized …
exploitation compromises the integrity and availability of systems. The use of specialized …
Improving interpretability for cyber vulnerability assessment using focus and context visualizations
KB Alperin, AB Wollaber… - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Risk scoring provides a simple and quantifiable metric for decision support in cyber security
operations, including prioritizing how to address discovered software vulnerabilities …
operations, including prioritizing how to address discovered software vulnerabilities …
ILLATION: Improving Vulnerability Risk Prioritization By Learning From Network
Network administrators face the challenge of efficiently patching overwhelming volumes of
vulnerabilities with limited time and resources. To address this issue, they must prioritize …
vulnerabilities with limited time and resources. To address this issue, they must prioritize …
Security challenges for modern data centers with IoT: a preliminary study
The wide deployment of internet of things (IoT) devices makes a profound impact on the data
center industry from various perspectives, varying from infrastructure operation, resource …
center industry from various perspectives, varying from infrastructure operation, resource …
The analysis of binary file security using a hierarchical quality model
AL Johnson - 2022 - scholarworks.montana.edu
Software security is commanding significant attention from practitioners. In many
organizations, security assessment has been integrated into the software development …
organizations, security assessment has been integrated into the software development …
Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities
J Wunder, A Kurtz, C Eichenmüller… - arXiv preprint arXiv …, 2023 - arxiv.org
The Common Vulnerability Scoring System (CVSS) is a popular method for evaluating the
severity of vulnerabilities in vulnerability management. In the evaluation process, a numeric …
severity of vulnerabilities in vulnerability management. In the evaluation process, a numeric …