Zobrazeno 1 - 10
of 2 339
pro vyhledávání: '"Offensive security"'
Autor:
Valencia, Leroy Jacob
In the vast domain of cybersecurity, the transition from reactive defense to offensive has become critical in protecting digital infrastructures. This paper explores the integration of Artificial Intelligence (AI) into offensive cybersecurity, partic
Externí odkaz:
http://arxiv.org/abs/2406.07561
Autor:
Shao, Minghao, Jancheska, Sofija, Udeshi, Meet, Dolan-Gavitt, Brendan, Xi, Haoran, Milner, Kimberly, Chen, Boyuan, Yin, Max, Garg, Siddharth, Krishnamurthy, Prashanth, Khorrami, Farshad, Karri, Ramesh, Shafique, Muhammad
Large Language Models (LLMs) are being deployed across various domains today. However, their capacity to solve Capture the Flag (CTF) challenges in cybersecurity has not been thoroughly evaluated. To address this, we develop a novel method to assess
Externí odkaz:
http://arxiv.org/abs/2406.05590
Autor:
Shao, Minghao, Chen, Boyuan, Jancheska, Sofija, Dolan-Gavitt, Brendan, Garg, Siddharth, Karri, Ramesh, Shafique, Muhammad
Capture The Flag (CTF) challenges are puzzles related to computer security scenarios. With the advent of large language models (LLMs), more and more CTF participants are using LLMs to understand and solve the challenges. However, so far no work has e
Externí odkaz:
http://arxiv.org/abs/2402.11814
Autor:
Happe, Andreas, Cito, Jürgen
Offensive security-tests are a common way to pro-actively discover potential vulnerabilities. They are performed by specialists, often called penetration-testers or white-hat hackers. The chronic lack of available white-hat hackers prevents sufficien
Externí odkaz:
http://arxiv.org/abs/2308.07057
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Computer Security Update, 2022 May 01. 23(5), 5-7.
Externí odkaz:
https://www.jstor.org/stable/48661207
Organizations struggle to handle sheer number of vulnerabilities in their cloud environments. The de facto methodology used for prioritizing vulnerabilities is to use Common Vulnerability Scoring System (CVSS). However, CVSS has inherent limitations
Externí odkaz:
http://arxiv.org/abs/2206.11182
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.