Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits.
Octavian SuciuConnor NelsonZhuoer LyuTiffany BaoTudor DumitrasPublished in: USENIX Security Symposium (2022)
Keyphrases
- clustering algorithm
- databases
- practical application
- development process
- case study
- knowledge based systems
- software engineering
- data structure
- design tools
- rapid development
- information processing
- level set
- video sequences
- database systems
- knowledge base
- information systems
- search engine
- learning algorithm
- neural network