Главная
Study mode:
on
1
Intro
2
How Do You Give Security Advice?
3
To Patch or Not To Patch?
4
Can We Predict Exploits?
5
Must Validate Predictions-Exploits in the Wild
6
Machine Learning and Security Predictions
7
Prediction With Intrinsic Features
8
What Are We Predicting?
9
Intuition: CVE-2017-0144
10
Mining Twitter to predict Exploitation
11
Predicting Exploits in the Wild
12
Did We Get Lucky?
13
Time to Patch 50% of Vulnerable Hosts
14
One Vulnerability, Different Patches
15
Patching Patterns As Risk Factors
16
#3. Prediction Performance
17
What You Can Do Today
18
What You Can Do Tomorrow
Description:
Explore the intricacies of predicting software vulnerability exploitation in this 21-minute conference talk from USENIX Enigma 2019. Delve into research findings based on data from 10 million hosts, uncovering insights on global vulnerability impact and exploitation trends. Learn about the decreasing fraction of exploited vulnerabilities despite their growing discovery rate, and understand why popular vulnerability metrics like CVSS scores poorly correlate with real-world exploits. Discover how combining technical vulnerability characteristics, social media information, and patching rates can create predictive models for assessing exploitation risks. Gain valuable knowledge on objectively evaluating defensive technologies, determining biggest security risks, and applying data-driven approaches to cybersecurity decision-making and policy formulation.

How to Predict Which Vulnerabilities Will Be Exploited - Tudor Dumitras - USENIX Enigma Conference - 2019

USENIX Enigma Conference
Add to list