Vulnerability detection

Attack Techniques and Threat Identification for Vulnerabilities

Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta | Published: 2022-06-22
Attacker Behavior Analysis
Vulnerability Analysis
Vulnerability detection

Vulnerability Detection in Open Source Software: An Introduction

Authors: Stuart Millar | Published: 2022-03-06
Dynamic Analysis
Vulnerability detection
Static Analysis

Automated Security Assessment for the Internet of Things

Authors: Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar | Published: 2021-09-09
Risk Assessment Method
Machine Learning
Vulnerability detection

ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning

Authors: Oliver Lutz, Huili Chen, Hossein Fereidooni, Christoph Sendner, Alexandra Dmitrienko, Ahmad Reza Sadeghi, Farinaz Koushanfar | Published: 2021-03-23
Multi-output Model
Vulnerability detection
evaluation metrics

Cyber-Attack Consequence Prediction

Authors: Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-01 | Updated: 2020-12-02
Data Collection
Feature Extraction Method
Vulnerability detection

Hardware-Assisted Detection of Firmware Attacks in Inverter-Based Cyberphysical Microgrids

Authors: Abraham Peedikayil Kuruvila, Ioannis Zografopoulos, Kanad Basu, Charalambos Konstantinou | Published: 2020-09-16 | Updated: 2021-04-18
Hardware Design
Malware Classification
Vulnerability detection

Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment

Authors: Zahra Noury, Mahdi Rezaei | Published: 2020-06-15 | Updated: 2020-06-24
Performance Evaluation
Deep Learning Method
Vulnerability detection

Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection

Authors: Abdallah Moubayed, Emad Aqeeli, Abdallah Shami | Published: 2020-06-08
Attack Method
Feature Engineering
Vulnerability detection

Printing and Scanning Attack for Image Counter Forensics

Authors: Hailey Joren, Otkrist Gupta, Dan Raviv | Published: 2020-04-27 | Updated: 2020-06-24
Algorithm
Image Feature Extraction
Vulnerability detection

FTT-NAS: Discovering Fault-Tolerant Convolutional Neural Architecture

Authors: Xuefei Ning, Guangjun Ge, Wenshuo Li, Zhenhua Zhu, Yin Zheng, Xiaoming Chen, Zhen Gao, Yu Wang, Huazhong Yang | Published: 2020-03-20 | Updated: 2021-04-12
Robustness
Vulnerability detection
Weight Update Method