TECHNOLOGYEarly Identification and Prediction of Exploits Using Social Media
Overview
The number of software security vulnerabilities discovered in recent years has grown significantly. Several of these vulnerabilities, such as Heartbleed and Shellshock, became widely known and reported. However, when these exploits become publicly known, malicious users can create exploits of their own based on known information. Therefore, it is valuable to know when information about an exploit becomes public as soon as possible, especially if the exploit is not yet listed in a vulnerability database such as the Common Vulnerabilities and Exposures (CVE) system.Researchers at the University of Maryland have developed an algorithm and software that scans publically available tweets and other social media posts to identify potential new exploits of known software vulnerabilities. By searching for relevant information posted to Twitter, it may be possible to find leaked information about an exploit, serving as an early warning system for detecting new proof of concept or actual exploits. Part of this algorithm includes accounting for malicious actors who might attack to ‘poison’ the data used by the algorithm by posted tweets designed to trigger false positives.
Applications
· Identifying new exploits of known software vulnerabilitiesAdvantages
· Can find information of exploits faster by two days on average· Includes mechanisms to resist adversaries’ attempts to compromise software with misleading tweets
Contact Info
UM Ventures
0134 Lee Building
7809 Regents Drive
College Park, MD 20742
Email: [email protected]
Phone: (301) 405-3947 | Fax: (301) 314-9502