Search Results for author: Tomohiko Yagyu

Found 2 papers, 0 papers with code

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

no code implementations10 Aug 2020 Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

Given a description of a security vulnerability, the proposed framework first extracts the relevant attack entities required to model the attack, completes missing information on the vulnerability, and derives a new interaction rule that models the attack; this new rule is integrated within MulVAL attack graph tool.

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities

no code implementations30 Jun 2020 Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai

The results show that Autosploit is able to automatically identify the system properties that affect the ability to exploit a vulnerability in both noiseless and noisy environments.

Cannot find the paper you are looking for? You can Submit a new open access paper.