ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2102.07869
  4. Cited By
Technical Report -- Expected Exploitability: Predicting the Development
  of Functional Vulnerability Exploits
v1v2 (latest)

Technical Report -- Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits

15 February 2021
Octavian Suciu
Connor Nelson
Zhuo Lyu
Tiffany Bao
Tudor Dumitras
ArXiv (abs)PDFHTML

Papers citing "Technical Report -- Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits"

10 / 10 papers shown
Title
Scoring the Unscorables: Cyber Risk Assessment Beyond Internet Scans
Scoring the Unscorables: Cyber Risk Assessment Beyond Internet Scans
Armin Sarabi
Manish Karir
Mingyan Liu
18
0
0
07 Jun 2025
An Accurate and Efficient Vulnerability Propagation Analysis Framework
An Accurate and Efficient Vulnerability Propagation Analysis Framework
Bonan Ruan
Zhiwei Lin
Jiahao Liu
Chuqi Zhang
Kaihang Ji
Zhenkai Liang
60
0
0
02 Jun 2025
DAEDALUS: Defense Against Firmware ROP Exploits Using Stochastic
  Software Diversity
DAEDALUS: Defense Against Firmware ROP Exploits Using Stochastic Software Diversity
Islam Obaidat
Meera Sridhar
Fatemeh Tavakoli
AAML
53
0
0
29 Jan 2024
Vulnerability Clustering and other Machine Learning Applications of
  Semantic Vulnerability Embeddings
Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings
Mark-Oliver Stehr
Minyoung Kim
43
0
0
23 Aug 2023
Cream Skimming the Underground: Identifying Relevant Information Points
  from Online Forums
Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums
Felipe Moreno Vera
M. Nogueira
Cainã Figueiredo
Daniel S. Menasché
Miguel Bicudo
Ashton Woiwood
Enrico Lovat
Anton Kocheturov
L. P. D. Aguiar
50
3
0
03 Aug 2023
On the Uses of Large Language Models to Interpret Ambiguous Cyberattack
  Descriptions
On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions
Reza Fayyazi
S. Yang
75
15
0
24 Jun 2023
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions
  with Community-Driven Insights
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights
Jay Jacobs
Sasha Romanosky
Octavian Suciuo
Benjamin Edwards
Armin Sarabi
46
22
0
27 Feb 2023
Exploring the Limits of Transfer Learning with Unified Model in the
  Cybersecurity Domain
Exploring the Limits of Transfer Learning with Unified Model in the Cybersecurity Domain
Kuntal Kumar Pal
Kazuaki Kashihara
Ujjwala Anantheswaran
Kirby Kuznia
S. Jagtap
Chitta Baral
AAML
29
3
0
20 Feb 2023
Beyond the Surface: Investigating Malicious CVE Proof of Concept
  Exploits on GitHub
Beyond the Surface: Investigating Malicious CVE Proof of Concept Exploits on GitHub
Soufian El Yadmani
Robin The
Olga Gadyatskaya
99
4
0
15 Oct 2022
A Survey on Data-driven Software Vulnerability Assessment and
  Prioritization
A Survey on Data-driven Software Vulnerability Assessment and Prioritization
T. H. Le
Huaming Chen
Muhammad Ali Babar
98
86
0
18 Jul 2021
1