Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1708.04866
Cited By
v1
v2
v3
v4
v5 (latest)
Economic Factors of Vulnerability Trade and Exploitation
16 August 2017
Luca Allodi
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Economic Factors of Vulnerability Trade and Exploitation"
17 / 17 papers shown
Title
The Cyber Alliance Game: How Alliances Influence Cyber-Warfare
Gergely Benkő
Gergely Biczók
28
0
0
08 Oct 2024
Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums
Felipe Moreno Vera
40
0
0
07 May 2024
A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums
Giorgio Di Tizio
Gilberto Atondo Siu
Alice Hutchings
Fabio Massacci
32
0
0
18 Aug 2023
Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums
Felipe Moreno Vera
M. Nogueira
Cainã Figueiredo
Daniel S. Menasché
Miguel Bicudo
Ashton Woiwood
Enrico Lovat
Anton Kocheturov
L. P. D. Aguiar
63
3
0
03 Aug 2023
You Can Tell a Cybercriminal by the Company they Keep: A Framework to Infer the Relevance of Underground Communities to the Threat Landscape
Michele Campobasso
Radu Radulescu
Sylvan Brons
Luca Allodi
36
6
0
09 Jun 2023
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale
Michele Campobasso
Luca Allodi
33
3
0
06 Mar 2023
THREAT/crawl: a Trainable, Highly-Reusable, and Extensible Automated Method and Tool to Crawl Criminal Underground Forums
Michele Campobasso
Luca Allodi
30
7
0
07 Dec 2022
Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats
Giorgio Di Tizio
Michele Armellini
Fabio Massacci
AAML
61
10
0
16 May 2022
Technical Report -- Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
Octavian Suciu
Connor Nelson
Zhuo Lyu
Tiffany Bao
Tudor Dumitras
78
41
0
15 Feb 2021
DAHash: Distribution Aware Tuning of Password Hashing Costs
Wenjie Bai
Jeremiah Blocki
40
7
0
25 Jan 2021
CARONTE: Crawling Adversarial Resources Over Non-Trusted, High-Profile Environments
Michele Campobasso
Pavlo Burda
Luca Allodi
26
10
0
17 Sep 2020
Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale
Michele Campobasso
Luca Allodi
44
36
0
09 Sep 2020
On the Economics of Offline Password Cracking
Jeremiah Blocki
B. Harsha
Samson Zhou
51
71
0
09 Jun 2020
Mining user interaction patterns in the darkweb to predict enterprise cyber incidents
Soumajyoti Sarkar
Mohammad Almukaynizi
Jana Shakarian
Paulo Shakarian
13
16
0
24 Sep 2019
DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks
Mohammed Almukaynizi
E. Marin
Eric Nunes
Paulo Shakarian
Gerardo Simari
Dipsy Kapoor
Timothy Siedlecki
21
21
0
30 Oct 2018
A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities
Jukka Ruohonen
Luca Allodi
27
1
0
24 May 2018
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
Luca Allodi
S. Etalle
23
13
0
14 Jan 2018
1