IEEE Review Paper Template
IEEE Review Paper Template
Fadil Fazal Rahiman1 , Jishnu Das Anjam Kudy2 , Neha Ann John3 ,
Sreelekshmi Satheesh4 , Dr. Ansamma John5 , Dr. Manu J Pillai6
Department of Computer Science and Engineering
TKM College of Engineering
December 2024
Abstract—Vulnerabilities are weaknesses in software, hard- and impact. However, their efficacy is often constrained by
ware, or systems that attackers can exploit to compromise limitations such as the lack of real-world context, inadequate
security and functionality. These weaknesses, often due to coding handling of complex code structures, and a focus on known
errors, configuration issues, or design flaws, create potential
access points for malicious actors. Exploitability, which measures vulnerabilities, leaving many organizations ill-prepared for
the ease or likelihood of successful exploitation, is critical for emerging threats.
prioritizing vulnerabilities; some are easily exploitable, while
others require complex conditions or specific resources. Under- II. METHODOLOGY
standing and predicting exploitability helps cybersecurity teams Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do
focus on high-risk threats, enhancing security posture. This work
presents a seven-phase pipeline for vulnerability detection and eiusmod tempor incididunt ut labore et dolore magna aliqua.
exploitability prediction in device code, using diverse datasets Ut enim ad minim veniam, quis nostrud exercitation ullamco
and machine learning models. The approach leverages data laboris nisi ut aliquip ex ea commodo consequat. Duis aute
sets such as REVEAL, Big-Vul, DEVIGN, and the National irure dolor in reprehenderit in voluptate velit esse cillum dolore
Vulnerability Database (NVD) to support detection accuracy. The eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non
pipeline begins with code input and parsing to extract syntax
structures, followed by the generation of control flow graphs to proident, sunt in culpa qui officia deserunt mollit anim id est
model execution paths for analysis. Execution path extraction laborum.
then identifies routes for vulnerability detection, and code rep- Curabitur pretium tincidunt lacus. Nulla gravida orci a odio.
resentation uses pretrained models like CodeBERT to convert Nullam varius, turpis et commodo
paths into feature vectors. A Convolutional Neural Network
(CNN) model analyzes these vectors to detect vulnerabilities, III. L ITERATURE R EVIEW
while exploit prediction employs the Exploit Prediction Scoring
System (EPSS) and logistic regression to assign risk scores, The literature on vulnerability management and exploit pre-
prioritizing vulnerabilities. Finally, testing and validation ensure diction spans a wide spectrum of research themes, reflecting
the pipeline’s reliability using tools like pytest and Coverage.py. continuous advancements in cybersecurity practices. This sec-
This structured approach enhances vulnerability assessment and tion synthesizes insights from different references, categorized
exploitability prediction, enabling better risk prioritization and
remediation for cybersecurity in healthcare systems. into key thematic areas.