Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Market for zero-day exploits

Known as: The Market of Zero-Day Exploits 
The market for zero-day exploits refers to the commercial activity that happens around the trafficking of software exploits.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Governments and other bodies stockpile a significant number of zero-day vulnerabilities for offense. But at the same time, they… Expand
Is this relevant?
Review
2019
Review
2019
The recent malware outbreaks have shown that the existing end-point security solutions are not robust enough to secure the… Expand
Is this relevant?
2018
2018
The addition of synchrophasors to the power grid to improve observability comes at the cost of an increased attack surface: the… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table III
Is this relevant?
2018
2018
In the current state of global affairs, a market exists for zero-day exploits where researchers, nation states, industry… Expand
Is this relevant?
2016
2016
Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persistent threats, which are known… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2015
2015
Vulnerability scanners are deployed in computer networks and software to timely identify security flaws and misconfigurations… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2015
2015
  • 2015
  • Corpus ID: 38967208
| @RecordedFuture Every day about 20 new cyber vulnerabilities are released and reported, and these are related to various… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • table 1
Is this relevant?
2014
2014
  • Hannes Holm
  • 47th Hawaii International Conference on System…
  • 2014
  • Corpus ID: 17257137
A frequent claim that has not been validated is that signature based network intrusion detection systems (SNIDS) cannot detect… Expand
  • figure 1
  • figure 2
  • table 2
  • table 1
  • figure 3
Is this relevant?
2013
2013
In this paper, we present AMICO, a novel system for measuring and detecting malware downloads in live web traffic. AMICO learns… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2013
2013
The escalation of web-based threats has triggered the adoption of URL blocklists and web-object scanning techniques in anti-virus… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 4
Is this relevant?