Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis
暂无分享,去创建一个
Limin Sun | Qiang Li | Hongsong Zhu | Kai Yang | Haining Wang | XiaoFeng Wang | Xuan Feng | Xiaojing Liao | Xiaofeng Wang | Limin Sun | Haining Wang | Hongsong Zhu | Xiaojing Liao | Xuan Feng | Kai-Ts'ung Yang | Qiang Li
[1] Satoshi Sekine,et al. A survey of named entity recognition and classification , 2007 .
[2] Muhammad Zubair Shafiq,et al. A large scale exploratory analysis of software vulnerability life cycles , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[3] Leyla Bilge,et al. The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching , 2015, 2015 IEEE Symposium on Security and Privacy.
[4] Tudor Dumitras,et al. FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature , 2016, CCS.
[5] Stefan Savage,et al. You've Got Vulnerability: Exploring Effective Vulnerability Notifications , 2016, USENIX Security Symposium.
[6] David Brumley,et al. Automatic exploit generation , 2014, CACM.
[7] Vern Paxson,et al. A Large-Scale Empirical Study of Security Patches , 2017, CCS.
[8] Tudor Dumitras,et al. Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State , 2017, PAM.
[9] Ross J. Anderson,et al. Security in open versus closed systems - the dance of Boltzmann , 2002 .
[10] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[11] Mihai Surdeanu,et al. The Stanford CoreNLP Natural Language Processing Toolkit , 2014, ACL.
[12] William A. Arbaugh,et al. IEEE 52 Computer , 1985 .
[13] Tudor Dumitras,et al. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.
[14] Helen J. Wang,et al. ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[15] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[16] Frank Kargl,et al. Specification Mining for Intrusion Detection in Networked Control Systems , 2016, USENIX Security Symposium.
[17] D. S. Brown,et al. Responding to computer security incidents: Guidelines for incident handling , 1990 .
[18] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[19] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM 2004.
[20] Peiyuan Zong,et al. SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits , 2017, CCS.
[21] Zhou Li,et al. Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence , 2016, CCS.
[22] Qiang Li,et al. Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices , 2018, USENIX Security Symposium.