skip to main content
10.1145/3576915.3624386acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description

Published:21 November 2023Publication History

ABSTRACT

This work proposes a multi-task Natural Language Processing (NLP) system to normalize and summarize the descriptions into a uniform structure. A dataset was curated from an official public database and broken into several constituent entities representing a particular aspect of the description. A model is trained on the annotated features independently and jointly to generate a simple and uniform summary. We also introduce our human metrics to judge the quality of the generated summary with respect to human comprehension and content accuracy.

References

  1. -. MITRE's Common Vulnerabilities and Exposures (CVE). Online, 2022.Google ScholarGoogle Scholar
  2. -. Microsoft Security Response Center. Online, 2022.Google ScholarGoogle Scholar
  3. -. IBM X-Force Exchange. Online, 2022.Google ScholarGoogle Scholar
  4. -. National Vulnerability Database (NVD). Online, 2022.Google ScholarGoogle Scholar
  5. Hattan Althebeiti and David Mohaisen. Enriching vulnerability reports through automated and augmented description summarization. In 23rd International Conference Information Security Applications, WISA, volume 13009 of Lecture Notes in Computer Science, pages 265--277. Springer, 2022.Google ScholarGoogle Scholar
  6. Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, and Gang Wang. Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. In USENIX Security Symposium, pages 869--885, 2019.Google ScholarGoogle Scholar
  7. Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, and Limin Sun. Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. In USENIX Security Symposium, pages 887--903, 2019.Google ScholarGoogle Scholar
  8. Philipp Kuehn, Markus Bayer, Marc Wendelborn, and Christian Reuter. OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases. In International Conference on Availability, Reliability and Security, ARES, pages 22:1--22:11, 2021.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Mike Lewis, Yinhan Liu, Naman Goyal, Marjan Ghazvininejad, Abdelrahman Mohamed, Omer Levy, Veselin Stoyanov, and Luke Zettlemoyer. BART: Denoising Sequence-to-Sequence Pre-training for Natural Language Generation, Translation, and Comprehension. In Annual Meeting of the Association for Computational Linguistics, ACL, pages 7871--7880, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  10. Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan Narang, Michael Matena, Yanqi Zhou, Wei Li, and Peter J. Liu. Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer. J. Mach. Learn. Res., 21:140:1--140:67, 2020.Google ScholarGoogle Scholar

Index Terms

  1. Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
          November 2023
          3722 pages
          ISBN:9798400700507
          DOI:10.1145/3576915

          Copyright © 2023 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 November 2023

          Check for updates

          Qualifiers

          • poster

          Acceptance Rates

          Overall Acceptance Rate1,261of6,999submissions,18%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA
        • Article Metrics

          • Downloads (Last 12 months)81
          • Downloads (Last 6 weeks)13

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader