2014
DOI: 10.1007/978-3-319-11379-1_21
|View full text |Cite
|
Sign up to set email alerts
|

Some Vulnerabilities Are Different Than Others

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
47
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(58 citation statements)
references
References 10 publications
3
47
0
Order By: Relevance
“…This requires the definition of models that jointly evaluate attacker's and defender's strategies: (89) several independent studies showed that most attacks are driven by a handful of vulnerabilities only, suggesting that attackers choose vulnerabilities to exploit as opposed to launching attacks drawn randomly from a pool of exploits for all vulnerabilities. (46,47,103) Capturing these aspects may require to integrate socioeconomic models to evaluate attacker's incentives in marketing or buying a new vulnerability (91,102) or choosing a target. (89) We consider these aspects for future work.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…This requires the definition of models that jointly evaluate attacker's and defender's strategies: (89) several independent studies showed that most attacks are driven by a handful of vulnerabilities only, suggesting that attackers choose vulnerabilities to exploit as opposed to launching attacks drawn randomly from a pool of exploits for all vulnerabilities. (46,47,103) Capturing these aspects may require to integrate socioeconomic models to evaluate attacker's incentives in marketing or buying a new vulnerability (91,102) or choosing a target. (89) We consider these aspects for future work.…”
Section: Discussionmentioning
confidence: 99%
“…(37,45) Due to the studied along the guidelines of traditional safety analysis and QRA in the same fashion that natural risks are studied. prevalence of untargeted attacks in the overall risk scenario, (38,46,47) in this article we focus on this type of attacks.…”
Section: Following Ransbotham Andmentioning
confidence: 99%
See 1 more Smart Citation
“…We exploit the impactcomplexity e ect described in Section 3 to estimate the volume of a acks that a vulnerability can potentially receive if an a ack for it exists in the wild. Given the high incidence of unexploited vulnerabilities in the wild [12], a desirable property for our estimator is to maintain high true negative rates (something that the bare CVSS-score unfortunately does not do [2]), whereas false positives can be ruled out by more ne-grained assessments later in a triage process [5]. To build our estimator, we rst assign to each Impact and Access Complexity value an ordinal value derived directly from the original CVSS v2 speci cation [11].…”
Section: Potential Of Attackmentioning
confidence: 99%
“…By validating the actual "traces" attacks left on real systems, they claimed that the real attacker would behave less powerful than we thought and would not exploit every vulnerability. The attackers would strategically choose the busy periods and some certain vulnerabilities, while the efforts of security professionals were diffused across many vulnerabilities [20,21]. Based on this observation, Dumitraş [22] proposed a novel metrics that enabled a more accurate assessment of the risk of cyberattacks.…”
Section: Related Workmentioning
confidence: 99%