Skip to main content

Showing 1–2 of 2 results for author: Reinstadler, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2010.00533  [pdf, other

    cs.CR

    Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting

    Authors: Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly

    Abstract: Many public sources of cyber threat and vulnerability information exist to help defend cyber systems. This paper links MITRE's ATT&CK MATRIX of Tactics and Techniques, NIST's Common Weakness Enumerations (CWE), Common Vulnerabilities and Exposures (CVE), and Common Attack Pattern Enumeration and Classification list (CAPEC), to gain further insight from alerts, threats and vulnerabilities. We prese… ▽ More

    Submitted 10 February, 2021; v1 submitted 1 October, 2020; originally announced October 2020.

    Comments: 13 pages, 12 figures

  2. arXiv:2009.13562  [pdf, other

    cs.LG cs.CR stat.ML

    STRATA: Simple, Gradient-Free Attacks for Models of Code

    Authors: Jacob M. Springer, Bryn Marie Reinstadler, Una-May O'Reilly

    Abstract: Neural networks are well-known to be vulnerable to imperceptible perturbations in the input, called adversarial examples, that result in misclassification. Generating adversarial examples for source code poses an additional challenge compared to the domains of images and natural language, because source code perturbations must retain the functional meaning of the code. We identify a striking relat… ▽ More

    Submitted 19 August, 2021; v1 submitted 28 September, 2020; originally announced September 2020.

    Comments: KDD'21 AdvML Workshop