Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2022
DOI: 10.1145/3488932.3524054
|View full text |Cite
|
Sign up to set email alerts
|

PacJam

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Bloat is known to increase the vulnerabilities in software [4,10,12,31,50]. One common measure of the security impact of bloat is to compare the number of Common Vulnerabilities and Exposures (CVEs) found in the removed files to the total number of CVEs discovered [3,6,45]. For assessing CVEs in ML containers, it is crucial that the tools can scan for vulnerabilities in shared libraries and Python packages, which are the two main components of ML systems.…”
Section: Analysis Frameworkmentioning
confidence: 99%
“…Bloat is known to increase the vulnerabilities in software [4,10,12,31,50]. One common measure of the security impact of bloat is to compare the number of Common Vulnerabilities and Exposures (CVEs) found in the removed files to the total number of CVEs discovered [3,6,45]. For assessing CVEs in ML containers, it is crucial that the tools can scan for vulnerabilities in shared libraries and Python packages, which are the two main components of ML systems.…”
Section: Analysis Frameworkmentioning
confidence: 99%