What is it about?
Detecting vulnerabilities are important for software security. In our work we aim to correct data related to vulnerabilities by detecting falsely mapped weaknesses, and predicting the correct weakness associated with the vulnerability. Since this is a time consuming task, we use an automated machine learning method called knowledge graphs. We use vulnerability metadata such as affected products and weakness mappings to train the model to learn associations between these 3 type of data.
Featured Image
Photo by Ilya Pavlov on Unsplash
Why is it important?
Our results show that this method is suitable for use in real life vulnerability reporting and updating processes, carried out by private security advisories and public databases such as CVE.org or the NVD. We show that our results are promising for automating the root cause weakness detection of existing or new vulnerabilities.
Perspectives
Read the Original
This page is a summary of: Poster: Analyzing and Correcting Inaccurate CVE-CWE Mappings in the National Vulnerability Database, December 2024, ACM (Association for Computing Machinery),
DOI: 10.1145/3658644.3691375.
You can read the full text:
Contributors
The following have contributed to this page