datasets
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
datasets [2016/03/22 10:06] – [How to Access the Data] luca.allodi@unitn.it | datasets [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 19: | Line 19: | ||
* **ASV** Vulnerabilities of the Safari Web Browser extracted from the Apple Knowledge Base and integrated with the NVD to reconstruct affected versions. | * **ASV** Vulnerabilities of the Safari Web Browser extracted from the Apple Knowledge Base and integrated with the NVD to reconstruct affected versions. | ||
* **ESEJ** is the list of vulnerabilities in Google Chrome and Mozilla Firefox along with ranges of major versions affected by each vulnerability. For each vulnerability, | * **ESEJ** is the list of vulnerabilities in Google Chrome and Mozilla Firefox along with ranges of major versions affected by each vulnerability. For each vulnerability, | ||
+ | * **COMPR**ehension is a dataset collected in a series of controlled experiments on Model Comprehension for Security Risk Assessment. | ||
+ | * **Delta-Bench** collects revisions of Apache Tomcat 6.0 - 8.5 with security fixes of various CVEs. | ||
==== How to Access the Data ==== | ==== How to Access the Data ==== | ||
- Write us at < | - Write us at < | ||
- Specify the initial purpose for which you would like to use the data (this will go in the formal licence and in the web page with your name attached to it); | - Specify the initial purpose for which you would like to use the data (this will go in the formal licence and in the web page with your name attached to it); | ||
- | - We will fill the licensing agreement {{: | + | - We will fill the licensing agreement {{: |
- We will return the signed copy of the agreement and the excel file; | - We will return the signed copy of the agreement and the excel file; | ||
- Report to us at < | - Report to us at < | ||
Line 60: | Line 62: | ||
* Investigation on which CVEs are exploited by malicious exploit kits. [Scientist in charge: Aaron Powell] | * Investigation on which CVEs are exploited by malicious exploit kits. [Scientist in charge: Aaron Powell] | ||
- | 3. **MIT Sloan School of Management ** | + | 3. **MIT Sloan School of Management |
* Evaluation of security practice use in relation to how and when vulnerabilities are discovered and resolved in software development projects; evolution of the vulnerability discovery and resolution process over time in software development projects.[Scientists in charge: Stuart Madnick, Michael Siegel, James Houghton]. | * Evaluation of security practice use in relation to how and when vulnerabilities are discovered and resolved in software development projects; evolution of the vulnerability discovery and resolution process over time in software development projects.[Scientists in charge: Stuart Madnick, Michael Siegel, James Houghton]. | ||
Line 67: | Line 69: | ||
* Investigating the probability that a given vulnerability will be exploited as a function of (a) its CVSS base score as well as (b) other possible markers which are available at the time the vulnerability is first noted. | * Investigating the probability that a given vulnerability will be exploited as a function of (a) its CVSS base score as well as (b) other possible markers which are available at the time the vulnerability is first noted. | ||
+ | |||
+ | 5. ** NCSU (North Carolina State University)** | ||
+ | |||
+ | * Evaluation of security practice use in relation to how and when vulnerabilities are discovered and resolved in software development projects; evolution of the vulnerability discovery and resolution process over time in so[Users] ftware development projects [Scientists in charge: Laurie Williams, Patrick Morrison, Rahul Pandita] | ||
+ | |||
+ | 6. ** ECNU (East China Normal University) ** | ||
+ | |||
+ | * | ||
+ | |||
+ | 7. ** GWU (George Washington University) ** | ||
+ | |||
+ | * Dissertation research regarding vulnerability discovery modeling [Scientists in charge: Reuben Johnston, Thomas Mazzuchi]. | ||
+ | |||
+ | |||
+ | 8. ** IIIT-Delhi (Indraprastha Institute of Information Technology, Delhi) ** | ||
+ | |||
+ | * Understanding and predicting vulnerabilities by leveraging online contents (Scientists in charge: Baani Leen Kaur Jolly, Tanmoy Chakraborty) | ||
+ |
datasets.1458637609.txt.gz · Last modified: (external edit)