Economic factors of vulnerability trade and exploitation

L Allodi - Proceedings of the 2017 ACM SIGSAC conference on …, 2017 - dl.acm.org
Cybercrime markets support the development and diffusion of new attack technologies,
vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have …

Can the common vulnerability scoring system be trusted? a bayesian analysis

P Johnson, R Lagerström, M Ekstedt… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The Common Vulnerability Scoring System (CVSS) is the state-of-the art system for
assessing software vulnerabilities. However, it has been criticized for lack of validity and …

FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm

Y Fang, Y Liu, C Huang, L Liu - Plos one, 2020 - journals.plos.org
In recent years, the number of vulnerabilities discovered and publicly disclosed has shown a
sharp upward trend. However, the value of exploitation of vulnerabilities varies for attackers …

Proactive identification of exploits in the wild through vulnerability mentions online

M Almukaynizi, E Nunes, K Dharaiya… - … on Cyber Conflict …, 2017 - ieeexplore.ieee.org
The number of software vulnerabilities discovered and publicly disclosed is increasing every
year; however, only a small fraction of them is exploited in real-world attacks. With limitations …

An expert-based investigation of the common vulnerability scoring system

H Holm, KK Afridi - Computers & Security, 2015 - Elsevier
Abstract The Common Vulnerability Scoring System (CVSS) is the most widely used
standard for quantifying the severity of security vulnerabilities. For instance, all …

Assessing vulnerability exploitability risk using software properties

A Younis, YK Malaiya, I Ray - Software Quality Journal, 2016 - Springer
Attacks on computer systems are now attracting increased attention. While the current trends
in software vulnerability discovery indicate that the number of newly discovered …

[PDF][PDF] Software vulnerability markets: Discoverers and buyers

AM Algarni, YK Malaiya - International Journal of Computer and …, 2014 - academia.edu
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have
received some attention recently. However, the role of interaction among the vulnerability …

Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability

AA Younis, YK Malaiya, I Ray - 2014 IEEE 15th International …, 2014 - ieeexplore.ieee.org
An unpatched vulnerability can lead to security breaches. When a new vulnerability is
discovered, it needs to be assessed so that it can be prioritized. A major challenge in …

Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project

N Munaiah, F Camilo, W Wigham, A Meneely… - Empirical Software …, 2017 - Springer
As developers face an ever-increasing pressure to engineer secure software, researchers
are building an understanding of security-sensitive bugs (ie vulnerabilities). Research into …

Sved: Scanning, vulnerabilities, exploits and detection

H Holm, T Sommestad - MILCOM 2016-2016 IEEE Military …, 2016 - ieeexplore.ieee.org
This paper presents the Scanning, Vulnerabilities, Exploits and Detection tool (SVED).
SVED facilitates reliable and repeatable cyber security experiments by providing a means to …