Predicting Vulnerability Exploitation - How to Assess Cybersecurity Risks
USENIX Enigma Conference via YouTube
Overview
Syllabus
Intro
How Do You Give Security Advice?
To Patch or Not To Patch?
Can We Predict Exploits?
Must Validate Predictions-Exploits in the Wild
Machine Learning and Security Predictions
Prediction With Intrinsic Features [2010]
What Are We Predicting?
Intuition: CVE-2017-0144
Mining Twitter to Predict Exploitation
Predicting Exploits in the Wild
Did We Get Lucky?
Time to Patch 50% of Vulnerable Hosts Observed patching of 1,593 vulnerabilities over 5 years
One Vulnerability, Different Patches
#3. Patching Patterns As Risk Factors
#3. Prediction Performance
What You Can Do Today
What You Can Do Tomorrow
Taught by
USENIX Enigma Conference