Write a Blog >>

Exhaustively listing the software and hardware components of an information system is non-trivial. This makes even harder to analyze the risk created by a vulnerability disclosure in the context of a specific information system. Instead of basing the risk analysis of a newly disclosed vulnerability on a possibly obsolete list of components, we focus on the security team members tasked with protecting the information system, by studying how Chief Information Security Officers (CISOs) and their subordinates actually react to vulnerability disclosures. We propose to use active learning to extract the conscious and unconscious knowledge of an information system’s security team in order to automate the risk analysis of a newly disclosed (n-day) vulnerability for a specific system to be defended.