Economic factors of vulnerability trade and exploitation
L Allodi - Proceedings of the 2017 ACM SIGSAC conference on …, 2017 - dl.acm.org
Cybercrime markets support the development and diffusion of new attack technologies,
vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have …
vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have …
Can the common vulnerability scoring system be trusted? a bayesian analysis
The Common Vulnerability Scoring System (CVSS) is the state-of-the art system for
assessing software vulnerabilities. However, it has been criticized for lack of validity and …
assessing software vulnerabilities. However, it has been criticized for lack of validity and …
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
In recent years, the number of vulnerabilities discovered and publicly disclosed has shown a
sharp upward trend. However, the value of exploitation of vulnerabilities varies for attackers …
sharp upward trend. However, the value of exploitation of vulnerabilities varies for attackers …
Proactive identification of exploits in the wild through vulnerability mentions online
M Almukaynizi, E Nunes, K Dharaiya… - … on Cyber Conflict …, 2017 - ieeexplore.ieee.org
The number of software vulnerabilities discovered and publicly disclosed is increasing every
year; however, only a small fraction of them is exploited in real-world attacks. With limitations …
year; however, only a small fraction of them is exploited in real-world attacks. With limitations …
An expert-based investigation of the common vulnerability scoring system
H Holm, KK Afridi - Computers & Security, 2015 - Elsevier
Abstract The Common Vulnerability Scoring System (CVSS) is the most widely used
standard for quantifying the severity of security vulnerabilities. For instance, all …
standard for quantifying the severity of security vulnerabilities. For instance, all …
Assessing vulnerability exploitability risk using software properties
Attacks on computer systems are now attracting increased attention. While the current trends
in software vulnerability discovery indicate that the number of newly discovered …
in software vulnerability discovery indicate that the number of newly discovered …
[PDF][PDF] Software vulnerability markets: Discoverers and buyers
AM Algarni, YK Malaiya - International Journal of Computer and …, 2014 - academia.edu
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have
received some attention recently. However, the role of interaction among the vulnerability …
received some attention recently. However, the role of interaction among the vulnerability …
Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability
An unpatched vulnerability can lead to security breaches. When a new vulnerability is
discovered, it needs to be assessed so that it can be prioritized. A major challenge in …
discovered, it needs to be assessed so that it can be prioritized. A major challenge in …
Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project
As developers face an ever-increasing pressure to engineer secure software, researchers
are building an understanding of security-sensitive bugs (ie vulnerabilities). Research into …
are building an understanding of security-sensitive bugs (ie vulnerabilities). Research into …
Sved: Scanning, vulnerabilities, exploits and detection
H Holm, T Sommestad - MILCOM 2016-2016 IEEE Military …, 2016 - ieeexplore.ieee.org
This paper presents the Scanning, Vulnerabilities, Exploits and Detection tool (SVED).
SVED facilitates reliable and repeatable cyber security experiments by providing a means to …
SVED facilitates reliable and repeatable cyber security experiments by providing a means to …