Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
How Context Impacts Vulnerability Severity: An Analysis of Product-Specific CVSS Scores
- Lucas Senos Coutinho,
- Daniel Menasche,
- Lucas Miranda,
- Enrico Lovat,
- Srivastava Gaurav Kumar,
- Abhishek Ramchandran,
- Anton Kocheturov,
- Tobias Limmer
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 17–27https://doi.org/10.1145/3697090.3697109Software vulnerabilities are intrinsically related to product-specific characteristics. The properties of a vulnerability, along with its severity, must be assessed in the context of the product wherein the vulnerability is located. In this paper, our ...
MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery
PROMISE 2024: Proceedings of the 20th International Conference on Predictive Models and Data Analytics in Software EngineeringPages 42–51https://doi.org/10.1145/3663533.3664036Vulnerability datasets have become an important instrument in software security research, being used to develop automated, machine learning-based vulnerability detection and patching approaches. Yet, any limitations of these datasets may translate into ...
- extended-abstractJune 2024
Vulnerability Detection for software-intensive system
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringPages 510–515https://doi.org/10.1145/3661167.3661170Cyberattacks are becoming more sophisticated, and organizations are constantly under threat from various types of security breaches. To protect against these threats, it is essential to identify the vulnerability and impact of these weaknesses and ...
- research-articleApril 2024
Is unsafe an Achilles' Heel? A Comprehensive Study of Safety Requirements in Unsafe Rust Programming
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 106, Pages 1–13https://doi.org/10.1145/3597503.3639136Rust is an emerging, strongly-typed programming language focusing on efficiency and memory safety. With increasing projects adopting Rust, knowing how to use Unsafe Rust is crucial for Rust security. We observed that the description of safety ...
- extended-abstractJune 2023
Next-Generation Security Entity Linkage: Harnessing the Power of Knowledge Graphs and Large Language
SYSTOR '23: Proceedings of the 16th ACM International Conference on Systems and StoragePage 150https://doi.org/10.1145/3579370.3594759With the continuous increase in reported Common Vulnerabilities and Exposures (CVEs), security teams are overwhelmed by vast amounts of data, which are often analyzed manually, leading to a slow and inefficient process. To address cybersecurity ...
-
Keyword Extraction from Specification Documents for Planning Security Mechanisms
ICSE '23: Proceedings of the 45th International Conference on Software EngineeringPages 1661–1673https://doi.org/10.1109/ICSE48619.2023.00143Software development companies heavily invest both time and money to provide post-production support to fix security vulnerabilities in their products. Current techniques identify vulnerabilities from source code using static and dynamic analyses. ...
On Privacy Weaknesses and Vulnerabilities in Software Systems
ICSE '23: Proceedings of the 45th International Conference on Software EngineeringPages 1071–1083https://doi.org/10.1109/ICSE48619.2023.00097In this digital era, our privacy is under constant threat as our personal data and traceable online/offline activities are frequently collected, processed and transferred by many software applications. Privacy attacks are often formed by exploiting ...
- short-paperSeptember 2022
Advisory: vulnerability analysis in software development project dependencies
SPLC '22: Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume BPages 99–102https://doi.org/10.1145/3503229.3547058Security has become a crucial factor in the development of software systems. The number of dependencies in software systems is becoming a source of countless bugs and vulnerabilities. In the past, the product line community has proposed several ...
- research-articleAugust 2022
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 91, Pages 1–8https://doi.org/10.1145/3538969.3544458Identification of cyber threats is one of the essential tasks for security teams. Currently, cyber threats can be identified using knowledge organized into various formats, enumerations, and knowledge bases. This paper studies the current challenges of ...
- research-articleJuly 2022
The extent of orphan vulnerabilities from code reuse in open source software
ICSE '22: Proceedings of the 44th International Conference on Software EngineeringPages 2104–2115https://doi.org/10.1145/3510003.3510216Motivation: A key premise of open source software is the ability to copy code to other open source projects (white-box reuse). Such copying accelerates development of new projects, but the code flaws in the original projects, such as vulnerabilities, may ...
- research-articleJuly 2022
V-SZZ: automatic identification of version ranges affected by CVE vulnerabilities
ICSE '22: Proceedings of the 44th International Conference on Software EngineeringPages 2352–2364https://doi.org/10.1145/3510003.3510113Vulnerabilities publicly disclosed in the National Vulnerability Database (NVD) are assigned with CVE (Common Vulnerabilities and Exposures) IDs and associated with specific software versions. Many organizations, including IT companies and government, ...
- research-articleNovember 2022
Predicting the severity and exploitability of vulnerability reports using convolutional neural nets
EnCyCriS '22: Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical SystemsPages 1–8https://doi.org/10.1145/3524489.3527298Common Vulnerability and Exposure (CVE) reports published by Vulnerability Management Systems (VMSs) are used to evaluate the severity and exploitability of software vulnerabilities. Public vulnerability databases such as NVD uses the Common ...
- research-articleApril 2022
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 31, Issue 3Article No.: 49, Pages 1–27https://doi.org/10.1145/3498537Security vulnerabilities have been continually disclosed and documented. For the effective understanding, management, and mitigation of the fast-growing number of vulnerabilities, an important practice in documenting vulnerabilities is to describe the key ...
- research-articleMarch 2022
Vulnerability Forecasting: Theory and Practice
Digital Threats: Research and Practice (DTRAP), Volume 3, Issue 4Article No.: 42, Pages 1–27https://doi.org/10.1145/3492328It is possible to forecast the volume of CVEs released within a time frame with a given prediction interval. For example, the number of CVEs published between now and a year from now can be forecast within 8% of the actual value. Different predictive ...
- short-paperSeptember 2021
User-Avatar Relationships in Various Contexts: Does Context Influence a Users’ Perception and Choice of an Avatar?
MuC '21: Proceedings of Mensch und Computer 2021Pages 275–280https://doi.org/10.1145/3473856.3474007Avatars are in use when interacting in virtual environments in different contexts, in collaborative work, as well as in gaming and also in virtual meetings with friends. Therefore it is important to understand how the relationship between user and ...
- research-articleAugust 2021
Linking CVE’s to MITRE ATT&CK Techniques
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityArticle No.: 21, Pages 1–12https://doi.org/10.1145/3465481.3465758The MITRE Corporation is a non-profit organization that has made substantial efforts into creating and maintaining knowledge bases relevant to cybersecurity and has been widely adopted by the community. ATT&CK ”Adversarial Tactics, Techniques, and Common ...
- research-articleAugust 2020
Fighting N-day vulnerabilities with automated CVSS vector prediction at disclosure
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and SecurityArticle No.: 26, Pages 1–10https://doi.org/10.1145/3407023.3407038The Common Vulnerability Scoring System (CVSS) is the industry standard for describing the characteristics of a software vulnerability and measuring its severity. However, during the first days after a vulnerability disclosure, the initial human ...
- short-paperSeptember 2020
Exploring the Security Awareness of the Python and JavaScript Open Source Communities
MSR '20: Proceedings of the 17th International Conference on Mining Software RepositoriesPages 16–20https://doi.org/10.1145/3379597.3387513Software security is undoubtedly a major concern in today's software engineering. Although the level of awareness of security issues is often high, practical experiences show that neither preventive actions nor reactions to possible issues are always ...
- research-articleSeptember 2019
Cloud Computing Vulnerabilities Analysis
CCIOT '19: Proceedings of the 2019 4th International Conference on Cloud Computing and Internet of ThingsPages 48–53https://doi.org/10.1145/3361821.3361830Nowadays cloud computing technologies are the most widely used tools due to their great flexibility and also to their lower maintenance costs. Many vendors of cloud computing have appeared on the market for each type of cloud. These solutions still pose ...
- posterApril 2019
ThreatZoom: neural network for automated vulnerability mitigation
HotSoS '19: Proceedings of the 6th Annual Symposium on Hot Topics in the Science of SecurityArticle No.: 24, Pages 1–3https://doi.org/10.1145/3314058.3318167Increasing the variety and quantity of cyber threats becoming the evident that traditional human-in-loop approaches are no longer sufficient to keep systems safe. To address this momentous moot point, forward-thinking pioneers propose new cyber security ...