A Survey on Software Vulnerability Exploitability Assessment

S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …

Enhancing Vulnerability prioritization: Data-driven exploit predictions with community-driven insights

J Jacobs, S Romanosky, O Suciu… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
The number of disclosed vulnerabilities has been steadily increasing over the years. At the
same time, organizations face significant challenges patching their systems, leading to a …

No one drinks from the firehose: How organizations filter and prioritize vulnerability information

S de Smale, R van Dijk, X Bouwman… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The number of published software vulnerabilities is increasing every year. How do
organizations stay in control of their attack surface despite their limited staff resources? Prior …

Licality—likelihood and criticality: Vulnerability risk prioritization through logical reasoning and deep learning

Z Zeng, Z Yang, D Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Security and risk assessment aims to prioritize detected vulnerabilities for remediation in a
computer networking system. The widely used expert-based risk prioritization approach, eg …

An environment-specific prioritization model for information-security vulnerabilities based on risk factor analysis

J Reyes, W Fuertes, P Arévalo, M Macas - Electronics, 2022 - mdpi.com
Vulnerabilities represent a constant and growing risk for organizations. Their successful
exploitation compromises the integrity and availability of systems. The use of specialized …

Improving interpretability for cyber vulnerability assessment using focus and context visualizations

KB Alperin, AB Wollaber… - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Risk scoring provides a simple and quantifiable metric for decision support in cyber security
operations, including prioritizing how to address discovered software vulnerabilities …

ILLATION: Improving Vulnerability Risk Prioritization By Learning From Network

Z Zeng, D Huang, G Xue, Y Deng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Network administrators face the challenge of efficiently patching overwhelming volumes of
vulnerabilities with limited time and resources. To address this issue, they must prioritize …

Security challenges for modern data centers with IoT: a preliminary study

Z Zeng, CJ Chung, L Xie - … Proceedings of the Web Conference 2022, 2022 - dl.acm.org
The wide deployment of internet of things (IoT) devices makes a profound impact on the data
center industry from various perspectives, varying from infrastructure operation, resource …

The analysis of binary file security using a hierarchical quality model

AL Johnson - 2022 - scholarworks.montana.edu
Software security is commanding significant attention from practitioners. In many
organizations, security assessment has been integrated into the software development …

Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities

J Wunder, A Kurtz, C Eichenmüller… - arXiv preprint arXiv …, 2023 - arxiv.org
The Common Vulnerability Scoring System (CVSS) is a popular method for evaluating the
severity of vulnerabilities in vulnerability management. In the evaluation process, a numeric …