Skip to main content

Showing 1–4 of 4 results for author: Spring, J M

Searching in archive cs. Search in all archives.
.
  1. An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems

    Authors: Jonathan M Spring

    Abstract: Vulnerability management strategy, from both organizational and public policy perspectives, hinges on an understanding of the supply of undiscovered vulnerabilities. If the number of undiscovered vulnerabilities is small enough, then a reasonable investment strategy would be to focus on finding and removing the remaining undiscovered vulnerabilities. If the number of undiscovered vulnerabilities i… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

  2. arXiv:2101.10865  [pdf, other

    cs.CR cs.AI cs.LG

    On managing vulnerabilities in AI/ML systems

    Authors: Jonathan M. Spring, April Galyardt, Allen D. Householder, Nathan VanHoudnos

    Abstract: This paper explores how the current paradigm of vulnerability management might adapt to include machine learning systems through a thought experiment: what if flaws in machine learning (ML) were assigned Common Vulnerabilities and Exposures (CVE) identifiers (CVE-IDs)? We consider both ML algorithms and model objects. The hypothetical scenario is structured around exploring the changes to the six… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

    Comments: 16 pages. New Security Paradigms Workshop

  3. arXiv:2005.01654  [pdf, other

    cs.CR cs.AI

    Learning the Associations of MITRE ATT&CK Adversarial Techniques

    Authors: Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou

    Abstract: The MITRE ATT&CK Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures (TTP). However, this information would be highly useful for attack diagnosis (i.e., forensics) and mitigation (i.e., intrusion response) if we can reliably construct technique associations that will enable predicting unobserved attack techniques based on observed ones. In this pa… ▽ More

    Submitted 12 May, 2020; v1 submitted 16 April, 2020; originally announced May 2020.

    Comments: 13 pages, 15 figures. Pre-print / expanded version of paper accepted for publication at IEEE CNS 2020

  4. arXiv:1903.10080  [pdf, ps, other

    cs.CY cs.CR

    Review of human decision-making during computer security incident analysis

    Authors: Jonathan M. Spring, Phyllis Illari

    Abstract: We review practical advice on decision-making during computer security incident response. Scope includes standards from the IETF, ISO, FIRST, and the US intelligence community. To focus on human decision-making, the scope is the evidence collection, analysis, and reporting phases of response. The results indicate both strengths and gaps. A strength is available advice on how to accomplish many spe… ▽ More

    Submitted 24 March, 2019; originally announced March 2019.

    Comments: 58 pages, 45 pages excluding bibliography and glossary