Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information
15-17 mai 2019 Erquy (France)

Sponsors

Un événement

GDR Sécurité Informatique

Organisé par 

Inria
Towards Automated Risk Analysis of “One-day” Vulnerabilities
Clément Elbaz  1@  , Louis Rilling  2@  , Christine Morin  3@  
1 : Univ Rennes, Inria, CNRS, IRISA  (Inria)  -  Site web
L'Institut National de Recherche en Informatique et e n Automatique (INRIA)
Centre de recherche Inria Rennes - Bretagne Atlantique Campus universitaire de Beaulieu 35042 Rennes Cedex -  France
2 : DGA Maîtrise de l'information  (DGA.MI)
Direction générale de l'Armement (DGA)
BP7 - 35998 Rennes CEDEX 7 -  France
3 : Inria Rennes - Bretagne - Atlantique  (Inria / Myriads)  -  Site web
INRIA
Campus de Beaulieu 35042 Rennes cedex -  France

Common Vulnerabilities and Exposures (CVE) databases such as Mitre's CVE List and NIST's NVD database identify every disclosed vulnerability affecting any public software. However, during the early hours of a vulnerability disclosure, the metadata associated with these vulnerabilities is either missing, wrong, or at best sparse. This creates a challenge for robust automated analysis of new vulnerabilities. We present a new technique based on TF-IDF to map newly disclosed vulnerabilities to the most probably affected software products, formulated as an ordered list of relevant entries in the Common Platform Enumeration (CPE) database. For doing so we rely only on the human readable description of the vulnerability without any need for metadata.



  • Poster
Personnes connectées : 1