Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries

AA Al Alsadi, K Sameshima, K Yoshioka… - Proceedings of the 26th …, 2023 - dl.acm.org
… It publishes Common Vulnerabilities and Exposures (CVEs), … vulnerability is reserved in
the NVD, eg, due to pending CVE … However, 15 of the 64 vulnerabilities were not registered in …

Managing threats to health data and information: toward security

M Parker - Health Information Exchange, 2023 - Elsevier
… product security by addressing common vulnerabilities. Again, it will also help address the
need to reduce environmental vulnerabilities that can result in data exfiltration and breaches. …

Modeling cyberattack propagation and impacts on cyber-physical system safety: An experiment

T Serru, N Nguyen, M Batteux, A Rauzy - Electronics, 2022 - mdpi.com
… For example, some works use the common vulnerability and exposure (CVE) [68] repository
and define attacks as vulnerability exploits. Others use a more abstracted view and model …

Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors

H Wang, Z Zhu, D Meng - 2023 IEEE Symposium on Computers …, 2023 - ieeexplore.ieee.org
… open-source real-world vulnerability datasets up to 9 June 2021. We add the latest CVE
cases to the dataset. Then we get a real-world dataset of 2200 real-world CVE cases from 361 C/…

Towards designing an extendable vulnerability detection method for executable codes

M Mouzarani, B Sadeghiyan - Information and Software Technology, 2016 - Elsevier
… There are a huge number of specific vulnerabilities recorded in the CVE database. Thus,
the vulnerability seeking algorithm has to compare each operation in the program with many …

C2Store: C2 Server Profiles at Your Fingertips

V Jain, SMM Alam, SV Krishnamurthy… - Proceedings of the ACM …, 2023 - dl.acm.org
… For a randomly selected day (March 27th, 2023), we identify the C2 addresses reported first
by our chosen Twitter users. We obtained 298 C2 server addresses, and we checked to see …

Understanding Regular Expression Denial of Service (ReDoS): Insights from LLM-Generated Regexes and Developer Forums

ML Siddiq, J Zhang, JCDS Santos - Proceedings of the 32nd IEEE/ACM …, 2024 - dl.acm.org
… We used the GPT-3.5-Turbo released on June 2023, which is tuned for chat-style conversation
and powers a popular chat-based question-answering tool, ChatGPT [2]. Unlike the T5 …

Silent vulnerable dependency alert prediction with vulnerability key aspect explanation

J Sun, Z Xing, Q Lu, X Xu, L Zhu… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
… Public vulnerability advisory is a dictionary offering unique Common Vulnerabilities and
Exposures (CVE) ids to each publicly disclosed vulnerability. National …

Online Laboratory Access Control With Zero Trust Approach: Twingate Use Case

E Tuyishime, F Radu, P Cotfas, D Cotfas… - 2024 16th …, 2024 - ieeexplore.ieee.org
… actors have increasingly targeted VPNs, with almost 760 (by the time of writing) VPN-related
vulnerabilities listed in the Common Vulnerabilities and Exposures (CVE) database[11]. …

Avoiding the weaknesses of a penetration test

F Baiardi - Computer fraud & security, 2019 - magonlinelibrary.com
A penetration test is a traditional solution for evaluating and improving the robustness of an
ICT system. Such tests can be comprehensive, but problems can arise when deciding how to …