The Heavy Tails of Vulnerability Exploitation
暂无分享,去创建一个
[1] Marc Dacier,et al. Research in Attacks, Intrusions and Defenses , 2014, Lecture Notes in Computer Science.
[2] Fabio Massacci,et al. Comparing Vulnerability Severity and Exploits Using Case-Control Studies , 2013, TSEC.
[3] Yashwant K. Malaiya,et al. Modeling the vulnerability discovery process , 2005, 16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05).
[4] R Core Team,et al. R: A language and environment for statistical computing. , 2014 .
[5] A. Clauset,et al. On the Frequency of Severe Terrorist Events , 2006, physics/0606007.
[6] Fabio Massacci,et al. An independent validation of vulnerability discovery models , 2012, ASIACCS '12.
[7] Q. Vuong. Likelihood Ratio Tests for Model Selection and Non-Nested Hypotheses , 1989 .
[8] Sandy Clark,et al. Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities , 2010, ACSAC '10.
[9] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[10] Leyla Bilge,et al. Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.
[11] R. Tibshirani,et al. An Introduction to the Bootstrap , 1995 .
[12] Muhammad Zubair Shafiq,et al. A large scale exploratory analysis of software vulnerability life cycles , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[13] Fabio Massacci,et al. Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts , 2013, ESSoS.
[14] Tudor Dumitras,et al. Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild , 2014, RAID.
[15] Peter Nijkamp,et al. Accessibility of Cities in the Digital Economy , 2004, cond-mat/0412004.
[16] Fabio Massacci,et al. Comparing Vulnerability Severity and Exploits Using , 2014 .
[17] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[18] Hannes Holm. A Large-Scale Study of the Time Required to Compromise a Computer System , 2014, IEEE Transactions on Dependable and Secure Computing.
[19] Bernhard Plattner,et al. Large-scale vulnerability analysis , 2006, LSAD '06.
[20] Andy Ozment,et al. The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting , 2005, WEIS.
[21] Úlfar Erlingsson,et al. Engineering Secure Software and Systems , 2011, Lecture Notes in Computer Science.
[22] Fabio Massacci,et al. A preliminary analysis of vulnerability scores for attacks in wild: the ekits and sym datasets , 2012, BADGERS@CCS.
[23] Fabio Massacci,et al. Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring , 2013, 2013 IEEE Security and Privacy Workshops.
[24] Rick Wash,et al. Organization Interfaces—collaborative computing General Terms , 2022 .
[25] Robert Tibshirani,et al. An Introduction to the Bootstrap , 1994 .
[26] M. Newman. Power laws, Pareto distributions and Zipf's law , 2005 .
[27] Colin S Gillespie,et al. Fitting Heavy Tailed Distributions: The poweRlaw Package , 2014, 1407.3492.
[28] Andy Ozment,et al. Improving vulnerability discovery models , 2007, QoP '07.
[29] Fabio Massacci,et al. MalwareLab: Experimentation with Cybercrime Attack Tools , 2013, CSET.
[30] Sam Ransbotham,et al. An Empirical Analysis of Exploitation Attempts Based on Vulnerabilities in Open Source Software , 2010, WEIS.
[31] Stefan Savage,et al. Manufacturing compromise: the emergence of exploit-as-a-service , 2012, CCS.
[32] Karen A. Scarfone,et al. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0 , 2010 .
[33] Karen A. Scarfone,et al. SP 800-117. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0 , 2010 .
[34] Charles Miller,et al. The Legitimate vulnerability market: the secretive world of 0-day exploit sales , 2007, WEIS.
[35] Michael Mitzenmacher,et al. A Brief History of Generative Models for Power Law and Lognormal Distributions , 2004, Internet Math..