[HTML][HTML] A model-based mode-switching framework based on security vulnerability scores

M Riegler, J Sametinger, M Vierhauser… - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities can affect critical systems within an organization impacting
processes, workflows, privacy, and safety. When a software vulnerability becomes known …

Towards dynamic capture-the-flag training environments for reinforcement learning offensive security agents

RA Chetwyn, L Erdődi - … Conference on Big Data (Big Data), 2022 - ieeexplore.ieee.org
In this paper, we propose a formalised process for the generation of dynamically generated
SQL queries that are vulnerable to SQL injection attacks for the training of reinforcement …

Mode Switching for Secure Edge Devices

M Riegler, J Sametinger, C Schönegger - International Conference on …, 2022 - Springer
Many devices in various domains operate in different modes. We have suggested to use
mode switching for security purposes to make systems more resilient when vulnerabilities …

Adversary Simulation of Structured Query Language (SQL) Injection Attack Using Genetic Algorithm for Web Application Firewalls (WAF) Bypass

H Bahruddin, V Suryani, AA Wardana - Proceedings of SAI Intelligent …, 2023 - Springer
This research proposed adversary simulation for Structured Query Language (SQL) injection
attacks using the genetic algorithm to bypass Web Application Firewalls (WAF). SQL …