A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

Detecting and augmenting missing key aspects in vulnerability descriptions

H Guo, S Chen, Z Xing, X Li, Y Bai, J Sun - ACM Transactions on …, 2022 - dl.acm.org
Security vulnerabilities have been continually disclosed and documented. For the effective
understanding, management, and mitigation of the fast-growing number of vulnerabilities, an …

Chronos: Time-aware zero-shot identification of libraries from vulnerability reports

Y Lyu, T Le-Cong, HJ Kang, R Widyasari… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Tools that alert developers about library vulnerabilities depend on accurate, up-to-date
vulnerability databases which are maintained by security researchers. These databases …

Extending attack graphs to represent cyber-attacks in communication protocols and modern it networks

O Stan, R Bitton, M Ezrets, M Dadon… - … on Dependable and …, 2020 - ieeexplore.ieee.org
An attack graph is a method used to enumerate the possible paths that an attacker can take
in the organizational network. MulVAL is a known open-source framework used to …

Heuristic approach for countermeasure selection using attack graphs

O Stan, R Bitton, M Ezrets, M Dadon… - 2021 IEEE 34th …, 2021 - ieeexplore.ieee.org
Selecting the optimal set of countermeasures to secure a network is a challenging task,
since it involves various considerations and trade-offs, such as prioritizing the risks to …

Evaluating the cybersecurity risk of real-world, machine learning production systems

R Bitton, N Maman, I Singh, S Momiyama… - ACM Computing …, 2023 - dl.acm.org
Although cyberattacks on machine learning (ML) production systems can be harmful, today,
security practitioners are ill-equipped, lacking methodologies and tactical tools that would …

Extraction of phrase-based concepts in vulnerability descriptions through unsupervised labeling

S Yitagesu, Z Xing, X Zhang, Z Feng, X Li… - ACM Transactions on …, 2023 - dl.acm.org
Software vulnerabilities, once disclosed, can be documented in vulnerability databases,
which have great potential to advance vulnerability analysis and security research. People …

Towards an improved understanding of software vulnerability assessment using data-driven approaches

THM Le - arXiv preprint arXiv:2207.11708, 2022 - arxiv.org
The thesis advances the field of software security by providing knowledge and automation
support for software vulnerability assessment using data-driven approaches. Software …

Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings

MO Stehr, M Kim - arXiv preprint arXiv:2310.05935, 2023 - arxiv.org
Cyber-security vulnerabilities are usually published in form of short natural language
descriptions (eg, in form of MITRE's CVE list) that over time are further manually enriched …