作者: Tudor Dumitras , Carl Sabottke , Octavian Suciu
DOI:
关键词:
摘要: In recent years, the number of software vulnerabilities discovered has grown significantly. This creates a need for prioritizing response to new disclosures by assessing which are likely be exploited and quickly ruling out that not actually in real world. We conduct quantitative qualitative exploration vulnerability-related information disseminated on Twitter. then describe design Twitter-based exploit detector, we introduce threat model specific our problem. addition prioritization, detection techniques have applications risk modeling cyber-insurance they highlight value provided victims attacks.