Aug. 10, 2023, 1:11 a.m. | Tianyu Chen, Lin Li, Bingjie Shan, Guangtai Liang, Ding Li, Qianxiang Wang, Tao Xie

cs.CR updates on arXiv.org arxiv.org

To address security vulnerabilities arising from third-party libraries,
security researchers maintain databases monitoring and curating vulnerability
reports, e.g., the National Vulnerability Database (NVD). Application
developers can identify vulnerable libraries by directly querying the databases
with the name of each used library. However, the querying results of vulnerable
libraries are not reliable due to the incompleteness of vulnerability reports.
Thus, current approaches model the task of identifying vulnerable libraries as
a named-entity-recognition (NER) task or an extreme multi-label learning (XML)
task. …

address application application developers database databases descriptions developers identify library monitoring name national national vulnerability database nvd party reports researchers results security security researchers third third-party vulnerabilities vulnerability vulnerability database vulnerability reports vulnerable

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Senior Software Engineer, Security

@ Niantic | Zürich, Switzerland

Consultant expert en sécurité des systèmes industriels (H/F)

@ Devoteam | Levallois-Perret, France

Cybersecurity Analyst

@ Bally's | Providence, Rhode Island, United States

Digital Trust Cyber Defense Executive

@ KPMG India | Gurgaon, Haryana, India

Program Manager - Cybersecurity Assessment Services

@ TestPros | Remote (and DMV), DC