Главная
Study mode:
on
1
Intro
2
Motivation
3
We need to be in the machine
4
Measuring vulnerability decay at-scale
5
Main Contributions
6
Vulnerability Lifecycle with Shared Code
7
What is shared code?
8
Attack Scenario Trigger the old version
9
Datasets
10
Approach
11
Survival Analysis
12
Patching Milestones (medians)
13
Shared Code Impact
14
User Type Impact
15
Exploit Impact
16
Recommendations
17
Conclusions
18
Questions
Description:
Explore a comprehensive analysis of vulnerability patching in client-side applications through this 20-minute IEEE conference talk. Delve into the impact of shared code on security, examining data collected over 5 years from 8.4 million hosts. Discover novel attack scenarios involving infrequently used application versions and shared libraries. Learn about patching rates across different applications, user types, and the influence of exploit releases. Gain insights into the vulnerability lifecycle, survival analysis techniques, and recommendations for improving patch deployment processes. Understand the challenges posed by multiple installations and shared libraries in popular client applications, and explore strategies to enhance overall cybersecurity.

The Attack of the Clones - A Study of the Impact of Shared Code on Vulnerability Patching

IEEE
Add to list
0:00 / 0:00