|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 18 occurrences of 18 keywords
|
|
|
Results
Found 76 publication records. Showing 76 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
36 | Melanie Tupper, Nur Zincir-Heywood |
VEA-bility Security Metric: A Network Security Analysis Tool. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
network security, Attackability, Vulnerability, security metric, attack graphs, exploit, Exploitability, quantitative measure |
25 | Matthew Green 0001, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer |
Efficient Proofs of Software Exploitability for Real-world Processors. |
Proc. Priv. Enhancing Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef |
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Carlos Martin, Tuomas Sandholm |
Computing equilibria by minimizing exploitability with best-response ensembles. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Jiongxiao Wang, Junlin Wu 0001, Muhao Chen, Yevgeniy Vorobeychik, Chaowei Xiao |
On the Exploitability of Reinforcement Learning with Human Feedback for Large Language Models. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Manli Shu, Jiongxiao Wang, Chen Zhu 0001, Jonas Geiping, Chaowei Xiao, Tom Goldstein |
On the Exploitability of Instruction Tuning. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Ruipeng Wang, Kaixiang Chen, Zulie Pan, Yuwei Li, Qianyu Li, Yang Li, Min Zhang, Chao Zhang 0008 |
Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration. |
Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Jiao Yin 0003, Guihong Chen, Wei Hong, Hua Wang 0002, Jinli Cao, Yuan Miao 0001 |
Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction. |
WISE |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Linhao He, Yunchao Wang, Chenyu Yan, Xixing Li, Qiang Wei |
KBEE: Linux Kernel Vulnerability Exploitability Exploration. |
ICCEIC |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Xiang Tang, Houlin Zhou, Man Zhang, Yuheng Zhang, Guocheng Wu 0003, Hui Lu, Xiang Yu, Zhihong Tian |
Research on the Exploitability of Binary Software Vulnerabilities. |
CloudNet |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef |
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. |
RAID |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Seong-Su Yoon, Do-Yeon Kim, Ga-Gyeong Kim, Ieck-Chae Euom |
Vulnerability Assessment Framework Based on In-The-Wild Exploitability for Prioritizing Patch Application in Control System. |
WISA |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Manli Shu, Jiongxiao Wang, Chen Zhu 0001, Jonas Geiping, Chaowei Xiao, Tom Goldstein |
On the Exploitability of Instruction Tuning. |
NeurIPS |
2023 |
DBLP BibTeX RDF |
|
25 | Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang 0002 |
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. |
SP |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Zheyue Jiang, Yuan Zhang 0009, Jun Xu 0024, Xinqian Sun, Zhuang Liu, Min Yang 0002 |
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. |
SP |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Jiao Yin 0003, MingJian Tang 0001, Jinli Cao, Hua Wang 0002, Mingshan You |
A real-time dynamic concept adaptive learning algorithm for exploitability prediction. |
Neurocomputing |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Pavel Czempin, Adam Gleave |
Reducing Exploitability with Population Based Training. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Denizalp Goktas, Amy Greenwald |
Exploitability Minimization in Games and Beyond. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Matthew Green 0001, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer |
Efficient Proofs of Software Exploitability for Real-world Processors. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
25 | Kai Lehniger, Peter Langendörfer |
Through the Window: On the exploitability of Xtensa's Register Window Overflow. |
ITNAC |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Anthony DiGiovanni, Ambuj Tewari |
Balancing adaptability and non-exploitability in repeated games. |
UAI |
2022 |
DBLP BibTeX RDF |
|
25 | Mubin Ul Haque, Muhammad Ali Babar 0001 |
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. |
SANER |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras |
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. |
USENIX Security Symposium |
2022 |
DBLP BibTeX RDF |
|
25 | Thiago Figueiredo Costa, Mateus Tymburibá |
Exploitability Assessment with Genetically Tuned Interconnected Neural Networks. |
BRACIS (1) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Hong Jin Kang, Truong Giang Nguyen, Xuan-Bach Dinh Le, Corina S. Pasareanu, David Lo 0001 |
Test mimicry to assess the exploitability of library vulnerabilities. |
ISSTA |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Denizalp Goktas, Amy Greenwald |
Exploitability Minimization in Games and Beyond. |
NeurIPS |
2022 |
DBLP BibTeX RDF |
|
25 | Ahmet Okutan, Mehdi Mirakhorli |
Predicting the severity and exploitability of vulnerability reports using convolutional neural nets. |
EnCyCriS@ICSE |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Finbarr Timbers, Nolan Bard, Edward Lockhart, Marc Lanctot, Martin Schmid, Neil Burch, Julian Schrittwieser, Thomas Hubert, Michael Bowling |
Approximate Exploitability: Learning a Best Response. |
IJCAI |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Julio Manuel de Luis-Ruiz, Benito Ramiro Salas-Menocal, Gema Fernández-Maroto, Rubén Pérez-Álvarez, Raúl Pereda-García |
Determination of Environmental Factors for the Implementation of the Exploitability Index in Industrial Aggregate Mining Using Multi-Criteria Analysis. |
ISPRS Int. J. Geo Inf. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Navneet Bhatt, Adarsh Anand, Venkata S. S. Yadavalli |
Exploitability prediction of software vulnerabilities. |
Qual. Reliab. Eng. Int. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Anthony DiGiovanni, Ambuj Tewari |
Balancing Adaptability and Non-exploitability in Repeated Games. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
25 | Mubin Ul Haque, Muhammad Ali Babar 0001 |
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
25 | Adelin Travers, Lorna Licollari, Guanghan Wang, Varun Chandrasekaran, Adam Dziedzic, David Lie, Nicolas Papernot |
On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
25 | Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras |
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
25 | Jinghui Lyu, Yude Bai, Zhenchang Xing, Xiaohong Li 0001, Weimin Ge |
A Character-Level Convolutional Neural Network for Predicting Exploitability of Vulnerability. |
TASE |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Kenshi Abe, Yusuke Kaneko |
Off-Policy Exploitability-Evaluation in Two-Player Zero-Sum Markov Games. (PDF / PS) |
AAMAS |
2021 |
DBLP BibTeX RDF |
|
25 | Thomas Dullien |
Weird Machines, Exploitability, and Provable Unexploitability. |
IEEE Trans. Emerg. Top. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Yaman Roumani, Joseph Nwankpa |
Examining Exploitability Risk of Vulnerabilities: A Hazard Model. |
Commun. Assoc. Inf. Syst. |
2020 |
DBLP BibTeX RDF |
|
25 | Finbarr Timbers, Edward Lockhart, Martin Schmid, Marc Lanctot, Michael Bowling |
Approximate exploitability: Learning a best response in large games. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
25 | Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai |
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
25 | Kenshi Abe, Yusuke Kaneko |
Off-Policy Exploitability-Evaluation and Equilibrium-Learning in Two-Player Zero-Sum Markov Games. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
25 | Jason Jaskolka |
Evaluating the Exploitability of Implicit Interactions in Distributed Systems. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
25 | Jiao Yin 0003, MingJian Tang 0001, Jinli Cao, Hua Wang 0002 |
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description. |
Knowl. Based Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Keerthi K. 0002, Indrani Roy, Chester Rebeiro, Aritra Hazra, Swarup Bhunia |
FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Fenglei Deng, Jian Wang 0020, Bin Zhang, Chao Feng, Zhiyuan Jiang, Yunfei Su |
A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities. |
Sci. Program. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Edward Lockhart, Marc Lanctot, Julien Pérolat, Jean-Baptiste Lespiau, Dustin Morrill, Finbarr Timbers, Karl Tuyls |
Computing Approximate Equilibria in Sequential Adversarial Games by Exploitability Descent. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
25 | Seong-Kyun Mok, Eun-Sun Cho |
TraceFilter: An Exploitability Analyzer of Vulnerabilities in Binary Code. |
DASC/PiCom/DataCom/CyberSciTech |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Edward Lockhart, Marc Lanctot, Julien Pérolat, Jean-Baptiste Lespiau, Dustin Morrill, Finbarr Timbers, Karl Tuyls |
Computing Approximate Equilibria in Sequential Adversarial Games by Exploitability Descent. |
IJCAI |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Zhiyuan Jiang, Chao Feng, Chaojing Tang |
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression. |
Secur. Commun. Networks |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Jeremy Pitt |
From Usability to Exploitability: Digital Technology and Non-Participatory Design [Editorial]. |
IEEE Technol. Soc. Mag. |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Jing Zhang, Anmin Zhou, Liang Liu, Peng Jia 0005, Luping Liu |
Crash可利用性分析方法研究综述 (Review of Crash Exploitability Analysis Methods). |
计算机科学 |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Martin Salfer, Claudia Eckert 0001 |
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks. |
ARES |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Shubham Tripathi, Gustavo Grieco, Sanjay Rawat 0001 |
Exniffer: Learning to Prioritize Crashes by Assessing the Exploitability from Memory Dump. |
APSEC |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Guanhua Yan, Junchen Lu, Zhan Shu, Yunus Kucuk |
ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability. |
PAC |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Jianshan Peng, Mi Zhang, Qingxian Wang |
Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering. |
KSII Trans. Internet Inf. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray |
Assessing vulnerability exploitability risk using software properties. |
Softw. Qual. J. |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Enrico Daga, Mathieu d'Aquin, Alessandro Adamou, Enrico Motta |
Addressing exploitability of Smart City data. |
ISC2 |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Guanhua Yan, Yunus Kucuk, Max Slocum, David C. Last |
A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing. |
ISC |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Rattikorn Hewett, Phongphun Kijsanayothin |
Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model. |
Int. J. Netw. Secur. |
2015 |
DBLP BibTeX RDF |
|
25 | Subil Abraham, Suku Nair |
Exploitability analysis using predictive cybersecurity framework. |
CYBCONF |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray |
Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability. |
HASE |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green 0001, Tanja Lange 0001, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, Matthew Fredrikson |
On the Practical Exploitability of Dual EC in TLS Implementations. |
USENIX Security Symposium |
2014 |
DBLP BibTeX RDF |
|
25 | Angeles Saavedra, Javier Taboada, María Araújo, Eduardo Giráldez |
Generalized Linear Spatial Models to Predict Slate Exploitability. |
J. Appl. Math. |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Gustavo Grieco, Laurent Mounier, Marie-Laure Potet, Sanjay Rawat 0001 |
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis. |
ICST Workshops |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Zhikun Wang, Abdeslam Boularias, Katharina Mülling, Jan Peters 0001 |
Balancing Safety and Exploitability in Opponent Modeling. |
AAAI |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Falko Saust, Oliver Bley, Ralf Kutzner, Jörn-Marten Wille, Bernhard Friedrich, Markus Maurer |
Exploitability of vehicle related sensor data in cooperative systems. |
ITSC |
2010 |
DBLP DOI BibTeX RDF |
|
25 | John Tinsley, Andy Way |
Automatically generated parallel treebanks and their exploitability in machine translation. |
Mach. Transl. |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Mehran Bozorgi |
A machine learning framework for classifying invulnerabilites [sic] and predicting exploitability. |
|
2009 |
RDF |
|
23 | Pierre Parrend, Stéphane Frénot |
Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms. |
CBSE |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Howard Chivers |
Information Modeling for Automated Risk Analysis. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
security, model, communication, information, risk, service-oriented, threat |
23 | Wim Heirman, Joni Dambre, Jan Van Campenhout, Christof Debaes, Hugo Thienpont |
Traffic Temporal Analysis for Reconfigurable Interconnects in Shared-Memory Systems. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Howard Chivers, Jeremy Jacob |
Specifying Information-Flow Controls. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Peter J. Bentley |
Fractal Proteins. |
Genet. Program. Evolvable Mach. |
2004 |
DBLP DOI BibTeX RDF |
fractal proteins, scalability, complexity, development, evolvability |
23 | Vijay Sai, Xavier Franch, Neil A. M. Maiden |
Driving Component Selection through Actor-Oriented Models and Use Cases. |
ICCBSS |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Peter J. Bentley |
Evolving Fractal Proteins. |
ICES |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Mihaela D. Pal, Christopher M. Brislawn, Steven P. Brumby |
Feature Extraction from Hyperspectral Images Compressed Using the JPEG-2000 Standard. |
SSIAI |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #76 of 76 (100 per page; Change: )
|
|