Zero Day Vulnerabilities Assessments, Exploits Detection, and Various Design Patterns in Cyber Software

VM Thapa, S Srivastava, S Garg - AI Tools for Protecting and …, 2023 - igi-global.com
In this technology-driven era, software development and maintenance is a rapidly growing
domain and is predestined to thrive over the coming decade. But the growing demand for …

Cybersecurity applications in software: data-driven software vulnerability assessment and management

J Yin, MJ Tang, J Cao, M You, H Wang - Emerging trends in cybersecurity …, 2022 - Springer
Data, as one of the most valuable assets for both individuals and companies in the digital
age, is increasingly exposed to the threat of cyberattacks caused by software vulnerabilities …

[PDF][PDF] Zero-Day Exploits: Understanding the Most Dangerous Cyber Threats

N Pureti - … Journal of Advanced Engineering Technologies and …, 2022 - ijaeti.com
Zero-day exploits represent one of the most severe and challenging threats in the realm
ofcybersecurity. These exploits target software vulnerabilities that are unknown to the …

How to predict which vulnerabilities will be exploited

T Dumitras - 2019 - usenix.org
The rate at which software vulnerabilities are discovered is growing: the National
Vulnerability Database includes over 100,000 vulnerabilities, and 10% of these entries were …

Analysis of software vulnerability classification based on different technical parameters

S Garg, RK Singh, AK Mohapatra - Information Security Journal: A …, 2019 - Taylor & Francis
This paper presents a comprehensive analysis of software vulnerabilities based on different
technical parameters. The taxonomy of vulnerabilities presented here offers an insight into …

[PDF][PDF] Dramatically reducing software vulnerabilities: report to the White House Office of Science and Technology Policy

P Black, M Badger, B Guttman, E Fong - 2016 - csrc.nist.gov
The call for a dramatic reduction in software vulnerability is heard from multiple sources,
recently from the February 2016 Federal Cybersecurity Research and Development …

An in-depth analysis of common software vulnerabilities and their solutions

CW Van Dyke - 2004 - ir.library.oregonstate.edu
With the current security climate throughout the Internet, a large emphasis is being placed
on protecting software systems from attack by a malicious entity. Most successful attacks …

[PDF][PDF] Poster: Analysis of exploits in the wild

L Allodi, F Massacci - IEEE Symposium on Security & Privacy, 2013 - ieee-security.org
Vulnerability exploitation is a major threat vector for cyber attacks [2], making vulnerability
assessment a crucial moment in the security management process. The “criticality” of a …

Software vulnerabilities overview: A descriptive study

MC Sánchez, JMC de Gea… - Tsinghua Science …, 2019 - ieeexplore.ieee.org
Computer security is a matter of great interest. In the last decade there have been numerous
cases of cybercrime based on the exploitation of software vulnerabilities. This fact has …

Large scale characterization of software vulnerability life cycles

M Shahzad, MZ Shafiq, AX Liu - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Software systems inherently contain vulnerabilities that have been exploited in the past
resulting in significant revenue losses. The study of various aspects related to vulnerabilities …