A Survey on Data-driven Software Vulnerability Assessment and Prioritization

07/18/2021
by   Triet H. M. Le, et al.
0

Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security risks to many software systems. Given the limited resources in practice, SV assessment and prioritization help practitioners devise optimal SV mitigation plans based on various SV characteristics. The surge in SV data sources and data-driven techniques such as Machine Learning and Deep Learning have taken SV assessment and prioritization to the next level. Our survey provides a taxonomy of the past research efforts and highlights the best practices for data-driven SV assessment and prioritization. We also discuss the current limitations and propose potential solutions to address such issues.

READ FULL TEXT

page 10

page 17

page 19

research
07/24/2022

Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches

The thesis advances the field of software security by providing knowledg...
research
03/20/2018

Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS

The assessment of new vulnerabilities is an activity that accounts for i...
research
09/13/2021

Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review

Software Vulnerability Prediction (SVP) is a data-driven technique for s...
research
05/02/2022

Modeling and mitigation of occupational safety risks in dynamic industrial environments

Identifying and mitigating safety risks is paramount in a number of indu...
research
01/31/2022

The Stories We Tell About Data: Media Types for Data-Driven Storytelling

The emerging practice of data-driven storytelling is framing data using ...
research
08/18/2021

DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning

It is increasingly suggested to identify Software Vulnerabilities (SVs) ...
research
01/13/2023

Data Quality for Software Vulnerability Datasets

The use of learning-based techniques to achieve automated software vulne...

Please sign up or login with your details

Forgot password? Click here to reset