The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-Days
Abstract
References
Index Terms
- The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-Days
Recommendations
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
CCS '05: Proceedings of the 12th ACM conference on Computer and communications securityVulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically discovered by third party researchers. A determined attacker could discover ...
Honeypot Baselining for Zero Day Attack Detection
Honeypots are the network sensors used for capturing the network attacks. As these sensors are solely deployed for the purpose of being attacked and compromised hence they have to be closely monitored and controlled. In the work presented in this paper ...
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityTraditional software security patches often have the unfortunate side-effect of quickly alerting attackers that their attempts to exploit patched vulnerabilities have failed. Attackers greatly benefit from this information; it expedites their search for ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Marie-José Montpetit,
- Aris Leivadeas,
- Program Chairs:
- Steve Uhlig,
- Mobin Javed
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 400Total Downloads
- Downloads (Last 12 months)238
- Downloads (Last 6 weeks)30
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in