A survey on software vulnerability exploitability assessment

S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …

Strategic aspects of cyber risk information sharing

S Laube, R Böhme - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Cyber risk management largely reduces to a race for information between defenders of ICT
systems and attackers. Defenders can gain advantage in this race by sharing cyber risk …

The secret life of software vulnerabilities: A large-scale empirical study

E Iannone, R Guadagni, F Ferrucci… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Software vulnerabilities are weaknesses in source code that can be potentially exploited to
cause loss or harm. While researchers have been devising a number of methods to deal …

Beyond heuristics: learning to classify vulnerabilities and predict exploits

M Bozorgi, LK Saul, S Savage… - Proceedings of the 16th …, 2010 - dl.acm.org
The security demands on modern system administration are enormous and getting worse.
Chief among these demands, administrators must monitor the continual ongoing disclosure …

FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm

Y Fang, Y Liu, C Huang, L Liu - Plos one, 2020 - journals.plos.org
In recent years, the number of vulnerabilities discovered and publicly disclosed has shown a
sharp upward trend. However, the value of exploitation of vulnerabilities varies for attackers …

Predicting exploitation of disclosed software vulnerabilities using open-source data

BL Bullough, AK Yanchenko, CL Smith… - Proceedings of the 3rd …, 2017 - dl.acm.org
Each year, thousands of software vulnerabilities are discovered and reported to the public.
Unpatched known vulnerabilities are a significant security risk. It is imperative that software …

An empirical study of web vulnerability discovery ecosystems

M Zhao, J Grossklags, P Liu - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
In recent years, many organizations have established bounty programs that attract white hat
hackers who contribute vulnerability reports of web systems. In this paper, we collect publicly …

Are markets for vulnerabilities effective?

S Ransbotham, S Mitra, J Ramsey - Mis Quarterly, 2012 - JSTOR
Current reward structures in security vulnerability disclosure may be skewed toward
benefitting nefarious usage of vulnerability information rather than responsible disclosure …

[HTML][HTML] Comparison of entropy calculation methods for ransomware encrypted file identification

SR Davies, R Macfarlane, WJ Buchanan - Entropy, 2022 - mdpi.com
Ransomware is a malicious class of software that utilises encryption to implement an attack
on system availability. The target's data remains encrypted and is held captive by the …

Devising effective policies for bug-bounty platforms and security vulnerability discovery

M Zhao, A Laszka, J Grossklags - Journal of …, 2017 - scholarlypublishingcollective.org
Bug-bounty programs have the potential to harvest the effort and diverse knowledge of
thousands of independent security researchers, but running them at scale is challenging …