Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
How Context Impacts Vulnerability Severity: An Analysis of Product-Specific CVSS Scores
- Lucas Senos Coutinho,
- Daniel Menasche,
- Lucas Miranda,
- Enrico Lovat,
- Srivastava Gaurav Kumar,
- Abhishek Ramchandran,
- Anton Kocheturov,
- Tobias Limmer
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 17–27https://doi.org/10.1145/3697090.3697109Software vulnerabilities are intrinsically related to product-specific characteristics. The properties of a vulnerability, along with its severity, must be assessed in the context of the product wherein the vulnerability is located. In this paper, our ...
- research-articleNovember 2024
Enhanced (cyber) situational awareness: Using interpretable principal component analysis (iPCA) to automate vulnerability severity scoring
AbstractThe Common Vulnerability Scoring System (CVSS) is widely used in the cybersecurity industry to assess the severity of vulnerabilities. However, manual assessments and human error can lead to delays and inconsistencies. This study employs ...
Highlights- Introducing an innovative ML approach for forecasting Common Vulnerability Scoring System (CVSS) scores.
- Proposing a theory-driven method for forecasting CVSS scores using cyber situational awareness theory.
- Utilizing interpretable ...
MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery
PROMISE 2024: Proceedings of the 20th International Conference on Predictive Models and Data Analytics in Software EngineeringPages 42–51https://doi.org/10.1145/3663533.3664036Vulnerability datasets have become an important instrument in software security research, being used to develop automated, machine learning-based vulnerability detection and patching approaches. Yet, any limitations of these datasets may translate into ...
- extended-abstractJune 2024
Vulnerability Detection for software-intensive system
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringPages 510–515https://doi.org/10.1145/3661167.3661170Cyberattacks are becoming more sophisticated, and organizations are constantly under threat from various types of security breaches. To protect against these threats, it is essential to identify the vulnerability and impact of these weaknesses and ...
- research-articleJuly 2024
Evaluating the effectiveness of a security flaws prevention tool
Information and Software Technology (INST), Volume 170, Issue Chttps://doi.org/10.1016/j.infsof.2024.107427Abstract Context:Securing code is crucial for all software stakeholders. Nevertheless, state-of-the-art tools are imperfect and tend to miss critical errors, resulting in zero-day vulnerabilities. Thus, there is a need for alternatives to mitigate such ...
-
- research-articleApril 2024
Is unsafe an Achilles' Heel? A Comprehensive Study of Safety Requirements in Unsafe Rust Programming
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 106, Pages 1–13https://doi.org/10.1145/3597503.3639136Rust is an emerging, strongly-typed programming language focusing on efficiency and memory safety. With increasing projects adopting Rust, knowing how to use Unsafe Rust is crucial for Rust security. We observed that the description of safety ...
- ArticleApril 2024
Analysis of Cryptographic CVEs: Lessons Learned and Perspectives
AbstractCryptographic vulnerabilities can have a particularly far-reaching impact due to the ubiquity of cryptographic software. In this paper, we describe 30 cryptographic vulnerabilities, classify them according to a taxonomy published in previous work, ...
- research-articleDecember 2023
Longitudinal risk-based security assessment of docker software container images
AbstractAs the use of software containerisation has increased, so too has the need for security research on their usage, with various surveys and studies conducted to assess the overall security posture of software container images. To date, there has ...
- ArticleMarch 2024
On the Usage of NLP on CVE Descriptions for Calculating Risk
Computer Security. ESORICS 2023 International WorkshopsPages 104–123https://doi.org/10.1007/978-3-031-54204-6_6AbstractIn order to conduct a risk analysis on an ecosystem the potential threats to its assets must first be identified. The Risk Modelling Tool (RMT) of the CitySCAPE Project uses CWE - CAPEC - threat relationships that were mapped for identifying the ...
- ArticleJune 2024
Mapping and Analysis of Common Vulnerabilities in Popular Web Servers
AbstractThe digitalization of the modern society has made many organizations susceptible to cybercrime through exploitations of software vulnerabilities. The popular web servers Apache HTTP and Nginx make up around 65% of the market for web server ...
- ArticleJanuary 2024
Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
AbstractSecurity incidents and data breaches are increasing rapidly, and only a fraction of them is being reported. Public vulnerability databases, e.g., national vulnerability database (NVD) and common vulnerability and exposure (CVE), have been leading ...
- ArticleJuly 2023
Prevention of Cyber-Attacks and Privacy Breaches in Healthcare Sector
Computational Science and Its Applications – ICCSA 2023 WorkshopsPages 162–178https://doi.org/10.1007/978-3-031-37120-2_11AbstractPeriodically, analysts in the cybersecurity sector, collect and share relevant data about recent cybercrime trends. These insights cover many aspects of the current cyber-threat scenario, including actors involved, motivations of the attacks, ...
- extended-abstractJune 2023
Next-Generation Security Entity Linkage: Harnessing the Power of Knowledge Graphs and Large Language
SYSTOR '23: Proceedings of the 16th ACM International Conference on Systems and StoragePage 150https://doi.org/10.1145/3579370.3594759With the continuous increase in reported Common Vulnerabilities and Exposures (CVEs), security teams are overwhelmed by vast amounts of data, which are often analyzed manually, leading to a slow and inefficient process. To address cybersecurity ...
Keyword Extraction from Specification Documents for Planning Security Mechanisms
ICSE '23: Proceedings of the 45th International Conference on Software EngineeringPages 1661–1673https://doi.org/10.1109/ICSE48619.2023.00143Software development companies heavily invest both time and money to provide post-production support to fix security vulnerabilities in their products. Current techniques identify vulnerabilities from source code using static and dynamic analyses. ...
On Privacy Weaknesses and Vulnerabilities in Software Systems
ICSE '23: Proceedings of the 45th International Conference on Software EngineeringPages 1071–1083https://doi.org/10.1109/ICSE48619.2023.00097In this digital era, our privacy is under constant threat as our personal data and traceable online/offline activities are frequently collected, processed and transferred by many software applications. Privacy attacks are often formed by exploiting ...
- ArticleOctober 2023
Generic Error SDP and Generic Error CVE
AbstractThis paper introduces a new family of CVE schemes built from generic errors (GE-CVE) and identifies a vulnerability therein. To introduce the problem, we generalize the concept of error sets beyond those defined by a metric, and use the set-...
- research-articleMarch 2024
An application for collecting and mining reports referring vulnerabilities and exposures in physical systems: A comparative study of selected clustering methods
Procedia Computer Science (PROCS), Volume 225, Issue CPages 2763–2772https://doi.org/10.1016/j.procs.2023.10.268AbstractThis paper describes an application dedicated to collecting and mining reports of software safety vulnerabilities and exposures in physical systems. This work focuses on the clustering problem of such reports, which means grouping them through ...
- research-articleDecember 2022
Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases
AbstractThrough a built-in security analysis feature based on metadata, this article provides a novel framework that starts with a scenario input and produces a collection of visualizations based on Common Attack Pattern Enumeration and ...
- short-paperSeptember 2022
Advisory: vulnerability analysis in software development project dependencies
SPLC '22: Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume BPages 99–102https://doi.org/10.1145/3503229.3547058Security has become a crucial factor in the development of software systems. The number of dependencies in software systems is becoming a source of countless bugs and vulnerabilities. In the past, the product line community has proposed several ...
- ArticleAugust 2022
Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT
Trust, Privacy and Security in Digital BusinessPages 66–80https://doi.org/10.1007/978-3-031-17926-6_5AbstractA honeypot is a controlled and secure environment to examine different threats and understand attack patterns. Due to the highly dynamic environments, the growing adoption and use of Internet of Things (IoT) devices make configuring honeypots ...