Skip to main content

Showing 1–5 of 5 results for author: Yagyu, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2008.04377  [pdf, other

    cs.CR cs.LG

    An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

    Authors: Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

    Abstract: Attack graphs are one of the main techniques used to automate the risk assessment process. In order to derive a relevant attack graph, up-to-date information on known attack techniques should be represented as interaction rules. Designing and creating new interaction rules is not a trivial task and currently performed manually by security experts. However, since the number of new security vulnerab… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

    Comments: 16 pages, 11 figures

  2. arXiv:2007.00059  [pdf, other

    cs.CR cs.AI cs.SE

    Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities

    Authors: Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai

    Abstract: The existence of a security vulnerability in a system does not necessarily mean that it can be exploited. In this research, we introduce Autosploit -- an automated framework for evaluating the exploitability of vulnerabilities. Given a vulnerable environment and relevant exploits, Autosploit will automatically test the exploits on different configurations of the environment in order to identify th… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

  3. arXiv:1908.10055  [pdf, ps, other

    cs.SD eess.AS

    Overview of Tasks and Investigation of Subjective Evaluation Methods in Environmental Sound Synthesis and Conversion

    Authors: Yuki Okamoto, Keisuke Imoto, Tatsuya Komatsu, Shinnosuke Takamichi, Takumi Yagyu, Ryosuke Yamanishi, Yoichi Yamashita

    Abstract: Synthesizing and converting environmental sounds have the potential for many applications such as supporting movie and game production, data augmentation for sound event detection and scene classification. Conventional works on synthesizing and converting environmental sounds are based on a physical modeling or concatenative approach. However, there are a limited number of works that have addresse… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

  4. arXiv:1906.10943  [pdf, other

    cs.CR

    Heuristic Approach Towards Countermeasure Selection using Attack Graphs

    Authors: Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

    Abstract: Selecting the optimal set of countermeasures is a challenging task that involves various considerations and tradeoffs such as prioritizing the risks to mitigate and costs. The vast majority of studies for selecting a countermeasure deployment are based on a limited risk assessment procedure that utilizes the common vulnerability scoring system (CVSS). Such a risk assessment procedure does not nece… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

  5. arXiv:1906.09786  [pdf, other

    cs.CR

    Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks

    Authors: Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

    Abstract: An attack graph is a method used to enumerate the possible paths that an attacker can execute in the organization network. MulVAL is a known open-source framework used to automatically generate attack graphs. MulVAL's default modeling has two main shortcomings. First, it lacks the representation of network protocol vulnerabilities, and thus it cannot be used to model common network attacks such as… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.