<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Modelling the Security Ecosystem &#8211; is exploit availability exceeding patch availability?</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=35" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=35</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=35&#038;cpage=1#comment-32</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Wed, 15 Jul 2009 00:22:59 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=35#comment-32</guid>
		<description><![CDATA[@Ben -

I am using the definitions (explicit or implicit) directly from the paper. Here is what the paper said: &quot;An exploit is a piece of software, a virus, a set of data, or sequence of commands that takes advantage of a vulnerability in order to cause unintended or unanticipated behavior to occur in software or an embedded device. Proof-of-concept code or exploits provided within security research and analysis tools are also deemed exploits.&quot;

The way they chose the population is simply by using all listings from the data sources that had exploit data listed.
]]></description>
		<content:encoded><![CDATA[<p>@Ben -</p>
<p>I am using the definitions (explicit or implicit) directly from the paper. Here is what the paper said: &#8220;An exploit is a piece of software, a virus, a set of data, or sequence of commands that takes advantage of a vulnerability in order to cause unintended or unanticipated behavior to occur in software or an embedded device. Proof-of-concept code or exploits provided within security research and analysis tools are also deemed exploits.&#8221;</p>
<p>The way they chose the population is simply by using all listings from the data sources that had exploit data listed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ben</title>
		<link>http://spiresecurity.com/?p=35&#038;cpage=1#comment-31</link>
		<dc:creator>Ben</dc:creator>
		<pubDate>Tue, 14 Jul 2009 19:45:02 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=35#comment-31</guid>
		<description><![CDATA[It might be worth defining what you mean by &quot;exploit&quot; in this context. It seems that the definition of a vulnerability is that it is a bug or flaw that can be exploited in a certain manner, but that the ease of exploitation can range from very easy to very hard. If I&#039;m reading correctly, you&#039;re talking more about &quot;easily&quot; or &quot;readily&quot; exploited vulnerabilities, or maybe even that a working exploit is in the wild (as opposed to one being academic). fwiw.
]]></description>
		<content:encoded><![CDATA[<p>It might be worth defining what you mean by &#8220;exploit&#8221; in this context. It seems that the definition of a vulnerability is that it is a bug or flaw that can be exploited in a certain manner, but that the ease of exploitation can range from very easy to very hard. If I&#8217;m reading correctly, you&#8217;re talking more about &#8220;easily&#8221; or &#8220;readily&#8221; exploited vulnerabilities, or maybe even that a working exploit is in the wild (as opposed to one being academic). fwiw.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
