Vulnerability Detection for software-intensive system

被引:0
|
作者
Othman, Refat [1 ]
机构
[1] Free Univ Bozen Bolzano, Bolzano, Bolzano, Italy
关键词
ATT&CK; CAPEC; CWE; CVE; Transformer models; Pretrained language models;
D O I
10.1145/3661167.3661170
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cyberattacks are becoming more sophisticated, and organizations are constantly under threat from various types of security breaches. To protect against these threats, it is essential to identify the vulnerability and impact of these weaknesses and address them before attackers can exploit them. However, manually identifying and characterizing vulnerability can be a time-consuming and tedious process that adds to the workload of cybersecurity experts. To address this challenge, this research plan presents a doctoral research proposal to automate the process of identifying novel technologies, including learning-based technologies, to infer vulnerabilities from a text about an attack. In addition, this research plan uses natural language processing techniques to extract relevant information from attack text and analyze repositories for known vulnerabilities. This research plan presents an in-depth analysis of the research challenges and goals to understand how innovative technologies can be used to detect and identify vulnerabilities in text about attacks. It also covers the preliminary work done, literature review findings, and threats to validity.
引用
收藏
页码:510 / 515
页数:6
相关论文
共 50 条
  • [21] A Genetic Algorithm based Method of Fault Maintenance in Software-Intensive System
    Xiong Bin
    Zhang Li
    Yang Na
    Li Jing
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III, 2009, : 1056 - 1059
  • [22] Analyzing the Actual Execution of a Large Software-Intensive System for Determining Dependencies
    Arias, Trosky B. Callo
    Avgeriou, Paris
    America, Pierre
    FIFTEENTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2008, : 49 - +
  • [23] Modelling an Automotive Software-Intensive System with Adaptive Features Using ASMETA
    Arcaini, Paolo
    Bonfanti, Silvia
    Gargantini, Angelo
    Riccobene, Elvinia
    Scandurra, Patrizia
    RIGOROUS STATE-BASED METHODS, ABZ 2020, 2020, 12071 : 302 - 317
  • [24] Requirements specification of a software-intensive system in the health domain: An experience report
    Arenas, Carolina
    Garces, Lina
    Carmona, Maria J. C.
    Simoes, Claudia Marquez
    PROCEEDINGS OF THE 19TH BRAZILIAN SYMPOSIUM ON SOFTWARE QUALITY, SBOS 2020, 2020,
  • [25] Constructing a Resource Usage View of a Large and Complex Software-Intensive System
    Arias, Trosky B. Callo
    Avgeriou, Paris
    America, Pierre
    16TH WORKING CONFERENCE ON REVERSE ENGINEERING (WCRE 2009), 2009, : 247 - +
  • [26] The Open Wall: A Software-Intensive Art Installation
    Jaccheri, Letizia
    ERCIM NEWS, 2009, (77): : 62 - 63
  • [27] Study on Fault Evaluation in Software-Intensive Equipment
    Hao, Xue-Liang
    Wang, Yi-Gang
    Zhu, Xiao-Dong
    2012 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2012, : 323 - 325
  • [28] The Darwin project: Evolvability of software-intensive systems
    van de laar, Pire
    van Lod, Sjir
    Muller, Gerrit
    Punter, Teade
    Watts, David
    America, Pierre
    Rutgers, Joland
    THIRD INTERNATIONAL IEEE WORKSHOP ON SOFTWARE EVOLVABILITY, PROCEEDINGS, 2007, : 48 - +
  • [29] A holistic view on the dependability of software-intensive systems
    Sonneck, G
    Schoitsch, E
    Strigini, L
    COMPUTER SAFETY, RELIABILITY AND SECURITY, 1998, 1516 : 369 - 379
  • [30] Spiral development of software-intensive systems of systems
    Boehm, B
    Brown, W
    Turner, R
    ICSE 05: 27th International Conference on Software Engineering, Proceedings, 2005, : 706 - 707