Search Results

BRON -- Linking Attack Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations

1 code implementation1 Oct 2020

Many public sources of cyber threat and vulnerability information exist to serve the defense of cyber systems.

Cryptography and Security

Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media

1 code implementation NAACL 2019

In this paper, we investigate methods to analyze the severity of cybersecurity threats based on the language that is used to describe them online.

Towards an open standard for assessing the severity of robot security vulnerabilities, the Robot Vulnerability Scoring System (RVSS)

1 code implementation26 Jul 2018

Robots are typically not created with security as a main concern.

Robotics Cryptography and Security

OmniBOR: A System for Automatic, Verifiable Artifact Resolution across Software Supply Chains

1 code implementation14 Feb 2024

Software supply chain attacks, which exploit the build process or artifacts used in the process of building a software product, are increasingly of concern.

Software Engineering Cryptography and Security

Moving Target Defense for Web Applications using Bayesian Stackelberg Games

1 code implementation23 Feb 2016

We also address the issue of prioritizing vulnerabilities that when fixed, improves the security of the MTD system.

A Primer on Bayesian Neural Networks: Review and Debates

1 code implementation28 Sep 2023

Neural networks have achieved remarkable performance across various problem domains, but their widespread applicability is hindered by inherent limitations such as overconfidence in predictions, lack of interpretability, and vulnerability to adversarial attacks.

Bayesian Inference

CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software

2 code implementations19 Jul 2021

Data-driven research on the automated discovery and repair of security vulnerabilities in source code requires comprehensive datasets of real-life vulnerable code and their fixes.

severity prediction

Detecting Security Patches via Behavioral Data in Code Repositories

1 code implementation4 Feb 2023

The absolute majority of software today is developed collaboratively using collaborative version control tools such as Git.

Time Series

Bl0ck: Paralyzing 802.11 connections through Block Ack frames

1 code implementation12 Feb 2023

Despite Wi-Fi is at the eve of its seventh generation, security concerns regarding this omnipresent technology remain in the spotlight of the research community.

Cryptography and Security

FedRecAttack: Model Poisoning Attack to Federated Recommendation

1 code implementation1 Apr 2022

Experimental results demonstrate that our proposed FedRecAttack achieves the state-of-the-art effectiveness while its side effects are negligible.

Federated Learning Model Poisoning +1