{VulSim}: Leveraging Similarity of {Multi-Dimensional} Neighbor Embeddings for Vulnerability Detection

S Shimmi, A Rahman, M Gadde, H Okhravi… - 33rd USENIX Security …, 2024 - usenix.org
Despite decades of research in vulnerability detection, vulnerabilities in source code remain
a growing problem, and more effective techniques are needed in this domain. To enhance …

Vulnus: Visual vulnerability analysis for network security

M Angelini, G Blasilli, T Catarci, S Lenti… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Vulnerabilities represent one of the main weaknesses of IT systems and the availability of
consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for …

BUCEPHALUS: a BUsiness CEntric cybersecurity Platform for proActive anaLysis Using visual analyticS

M Angelini, G Blasilli, S Bonomi, S Lenti… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Analyzing and mitigating the threats that cyber-attacks pose on the services of a critical
infrastructure is not a trivial activity. Research solutions have been developed using data …

Optimizing Memory-Corruption Security Defenses for Real-Time Systems

A Horne - 2022 - dspace.mit.edu
Real-Time Systems (RTSs) frequently suffer from memory-corruption attacks. Compared to
general-purpose systems, RTSs differ because of their scheduling requirements. For this …

[PDF][PDF] Optimizing Runtime Security in Real-Time Embedded Systems

C Lemieux-Mack, K Leach, N Zhang, S Baruah… - opera24.di.unito.it
As real-time embedded systems (RTES) become more prevalent in society, their security is
increasingly important. However, as these systems are often safety or mission critical, it is …

Attack Planner: Systematization and Expansion of Persistence Knowledge

E Jiang - 2022 - dspace.mit.edu
The internet has become a component of society's critical infrastructure. However, the
benefit of using the internet has been accompanied by an increasing volume of …