Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries
AA Al Alsadi, K Sameshima, K Yoshioka… - Proceedings of the 26th …, 2023 - dl.acm.org
… It publishes Common Vulnerabilities and Exposures (CVEs), … vulnerability is reserved in
the NVD, eg, due to pending CVE … However, 15 of the 64 vulnerabilities were not registered in …
the NVD, eg, due to pending CVE … However, 15 of the 64 vulnerabilities were not registered in …
Managing threats to health data and information: toward security
M Parker - Health Information Exchange, 2023 - Elsevier
… product security by addressing common vulnerabilities. Again, it will also help address the
need to reduce environmental vulnerabilities that can result in data exfiltration and breaches. …
need to reduce environmental vulnerabilities that can result in data exfiltration and breaches. …
Modeling cyberattack propagation and impacts on cyber-physical system safety: An experiment
T Serru, N Nguyen, M Batteux, A Rauzy - Electronics, 2022 - mdpi.com
… For example, some works use the common vulnerability and exposure (CVE) [68] repository
and define attacks as vulnerability exploits. Others use a more abstracted view and model …
and define attacks as vulnerability exploits. Others use a more abstracted view and model …
Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors
H Wang, Z Zhu, D Meng - 2023 IEEE Symposium on Computers …, 2023 - ieeexplore.ieee.org
… open-source real-world vulnerability datasets up to 9 June 2021. We add the latest CVE
cases to the dataset. Then we get a real-world dataset of 2200 real-world CVE cases from 361 C/…
cases to the dataset. Then we get a real-world dataset of 2200 real-world CVE cases from 361 C/…
Towards designing an extendable vulnerability detection method for executable codes
M Mouzarani, B Sadeghiyan - Information and Software Technology, 2016 - Elsevier
… There are a huge number of specific vulnerabilities recorded in the CVE database. Thus,
the vulnerability seeking algorithm has to compare each operation in the program with many …
the vulnerability seeking algorithm has to compare each operation in the program with many …
C2Store: C2 Server Profiles at Your Fingertips
… For a randomly selected day (March 27th, 2023), we identify the C2 addresses reported first
by our chosen Twitter users. We obtained 298 C2 server addresses, and we checked to see …
by our chosen Twitter users. We obtained 298 C2 server addresses, and we checked to see …
Understanding Regular Expression Denial of Service (ReDoS): Insights from LLM-Generated Regexes and Developer Forums
… We used the GPT-3.5-Turbo released on June 2023, which is tuned for chat-style conversation
and powers a popular chat-based question-answering tool, ChatGPT [2]. Unlike the T5 …
and powers a popular chat-based question-answering tool, ChatGPT [2]. Unlike the T5 …
Silent vulnerable dependency alert prediction with vulnerability key aspect explanation
… Public vulnerability advisory is a dictionary offering unique Common Vulnerabilities and
Exposures (CVE) ids to each publicly disclosed vulnerability. National …
Exposures (CVE) ids to each publicly disclosed vulnerability. National …
Online Laboratory Access Control With Zero Trust Approach: Twingate Use Case
… actors have increasingly targeted VPNs, with almost 760 (by the time of writing) VPN-related
vulnerabilities listed in the Common Vulnerabilities and Exposures (CVE) database[11]. …
vulnerabilities listed in the Common Vulnerabilities and Exposures (CVE) database[11]. …
Avoiding the weaknesses of a penetration test
F Baiardi - Computer fraud & security, 2019 - magonlinelibrary.com
A penetration test is a traditional solution for evaluating and improving the robustness of an
ICT system. Such tests can be comprehensive, but problems can arise when deciding how to …
ICT system. Such tests can be comprehensive, but problems can arise when deciding how to …