datasets
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
datasets [2015/08/26 18:50] – [Users] luca.allodi@unitn.it | datasets [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 18: | Line 18: | ||
* **IEV** lists the vulnerabilities for //Internet Explorer// extracted from the Microsoft Security Bulletin and integrated with the NVD to reconstruct affected versions. | * **IEV** lists the vulnerabilities for //Internet Explorer// extracted from the Microsoft Security Bulletin and integrated with the NVD to reconstruct affected versions. | ||
* **ASV** Vulnerabilities of the Safari Web Browser extracted from the Apple Knowledge Base and integrated with the NVD to reconstruct affected versions. | * **ASV** Vulnerabilities of the Safari Web Browser extracted from the Apple Knowledge Base and integrated with the NVD to reconstruct affected versions. | ||
+ | * **ESEJ** is the list of vulnerabilities in Google Chrome and Mozilla Firefox along with ranges of major versions affected by each vulnerability. For each vulnerability, | ||
+ | * **COMPR**ehension is a dataset collected in a series of controlled experiments on Model Comprehension for Security Risk Assessment. | ||
+ | * **Delta-Bench** collects revisions of Apache Tomcat 6.0 - 8.5 with security fixes of various CVEs. | ||
==== How to Access the Data ==== | ==== How to Access the Data ==== | ||
- Write us at < | - Write us at < | ||
- Specify the initial purpose for which you would like to use the data (this will go in the formal licence and in the web page with your name attached to it); | - Specify the initial purpose for which you would like to use the data (this will go in the formal licence and in the web page with your name attached to it); | ||
- | - We will fill the licensing agreement {{:unitn_license_v2.6.pdf|}} with your data and the head of department (or a tenured full professor of department) should sign it; | + | - We will fill the licensing agreement {{:unitn_license_v4.0.pdf|(see uncompiled license)}} with your data and the head of department (or a tenured full professor of department) should sign it; |
- We will return the signed copy of the agreement and the excel file; | - We will return the signed copy of the agreement and the excel file; | ||
- Report to us at < | - Report to us at < | ||
Line 55: | Line 58: | ||
* Competence Center Security at DAI-Labor is a security research group, and in one of our current public-grant research projects, Auvegos, we develop a discrete-event simulation software for performing security analysis in network infrastructures, | * Competence Center Security at DAI-Labor is a security research group, and in one of our current public-grant research projects, Auvegos, we develop a discrete-event simulation software for performing security analysis in network infrastructures, | ||
- | 2. **MITRE** | + | 2. **MITRE |
+ | |||
+ | * Investigation on which CVEs are exploited by malicious exploit kits. [Scientist in charge: Aaron Powell] | ||
+ | |||
+ | 3. **MIT Sloan School of Management (Massachusetts Institute of Technology) ** | ||
+ | |||
+ | * Evaluation of security practice use in relation to how and when vulnerabilities are discovered and resolved in software development projects; evolution of the vulnerability discovery and resolution process over time in software development projects.[Scientists in charge: Stuart Madnick, Michael Siegel, James Houghton]. | ||
+ | |||
+ | 4. ** Pierre Trepagnier and James Riordan ** | ||
+ | |||
+ | * Investigating the probability that a given vulnerability will be exploited as a function of (a) its CVSS base score as well as (b) other possible markers which are available at the time the vulnerability is first noted. | ||
+ | |||
+ | 5. ** NCSU (North Carolina State University)** | ||
+ | |||
+ | * Evaluation of security practice use in relation to how and when vulnerabilities are discovered and resolved in software development projects; evolution of the vulnerability discovery and resolution process over time in so[Users] ftware development projects [Scientists in charge: Laurie Williams, Patrick Morrison, Rahul Pandita] | ||
+ | |||
+ | 6. ** ECNU (East China Normal University) ** | ||
+ | |||
+ | * | ||
+ | |||
+ | 7. ** GWU (George Washington University) ** | ||
+ | |||
+ | * Dissertation research regarding vulnerability discovery modeling [Scientists in charge: Reuben Johnston, Thomas Mazzuchi]. | ||
+ | |||
+ | |||
+ | 8. ** IIIT-Delhi (Indraprastha Institute of Information Technology, Delhi) ** | ||
+ | |||
+ | * Understanding and predicting vulnerabilities by leveraging online contents (Scientists in charge: Baani Leen Kaur Jolly, Tanmoy Chakraborty) | ||
- | * MITRE is a non-profit organization that conducts research in the public interest. |
datasets.1440607843.txt.gz · Last modified: (external edit)