Vulnerability Detection for software-intensive system

被引:0
|
作者
Othman, Refat [1 ]
机构
[1] Free Univ Bozen Bolzano, Bolzano, Bolzano, Italy
关键词
ATT&CK; CAPEC; CWE; CVE; Transformer models; Pretrained language models;
D O I
10.1145/3661167.3661170
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cyberattacks are becoming more sophisticated, and organizations are constantly under threat from various types of security breaches. To protect against these threats, it is essential to identify the vulnerability and impact of these weaknesses and address them before attackers can exploit them. However, manually identifying and characterizing vulnerability can be a time-consuming and tedious process that adds to the workload of cybersecurity experts. To address this challenge, this research plan presents a doctoral research proposal to automate the process of identifying novel technologies, including learning-based technologies, to infer vulnerabilities from a text about an attack. In addition, this research plan uses natural language processing techniques to extract relevant information from attack text and analyze repositories for known vulnerabilities. This research plan presents an in-depth analysis of the research challenges and goals to understand how innovative technologies can be used to detect and identify vulnerabilities in text about attacks. It also covers the preliminary work done, literature review findings, and threats to validity.
引用
收藏
页码:510 / 515
页数:6
相关论文
共 50 条
  • [1] QFD application to a software-intensive system development project
    Tran, TL
    IEMC 96 PROCEEDINGS - MANAGING VIRTUAL ENTERPRISES: A CONVERGENCE OF COMMUNICATIONS, COMPUTING, AND ENERGY TECHNOLOGIES, 1996, : 683 - 689
  • [2] Software and simulation modeling for real-time software-intensive system
    Huang, DP
    Sarjoughian, H
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON DISTRIBUTED SIMULATION AND REAL-TIME APPLICATIONS, PROCEEDINGS, 2004, : 196 - 203
  • [3] Dynamic Variability in Software-Intensive Embedded System Families
    Bosch, Jan
    Capilla, Rafael
    COMPUTER, 2012, 45 (10) : 28 - 35
  • [4] Continuous deployment in software-intensive system-of-systems
    Dakkak, Anas
    Bosch, Jan
    Olsson, Helena Holmstrom
    Mattos, David Issa
    INFORMATION AND SOFTWARE TECHNOLOGY, 2023, 159
  • [5] An Extended Hierarchical Safety Analysis for Software-Intensive System
    Jeong, Daehui
    Kwon, Gihwon
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 1250 - 1256
  • [6] Awareness in Software-Intensive Systems
    Vassev, Emil
    Hinchey, Mike
    COMPUTER, 2012, 45 (12) : 84 - 87
  • [7] RESEARCH ON SOFTWARE-INTENSIVE EQUIPMENT SYSTEM FAULT DIAGNOSIS TECHNOLOGY
    Feng Jianyuan
    Feng Quanfu
    Zhu Xiaodong
    Xu Renzuo
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 171 - 177
  • [8] Analysis of software-intensive system acquisition using hybrid software process simulation
    Choi, KeungSik
    Bae, Doo-Hwan
    SOFTWARE PROCESS CHANGE, 2006, 3966 : 254 - 261
  • [9] Defining Execution Viewpoints for a Large and Complex Software-Intensive System
    Arias, Trosky B. Callo
    America, Pierre
    Avgeriou, Paris
    2009 JOINT WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE AND EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE, 2009, : 1 - +
  • [10] Towards a Conceptual Model for Software-Intensive System-of-Systems
    Goncalves, Marcelo Benites
    Cavalcante, Everton
    Batista, Thais
    Oquendo, Flavio
    Nakagawa, Elisa Yumi
    2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 1605 - 1610