Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation

The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the target of cyber attackers. Hence, we propose a conceptual framework called 'Human-in-the-Loop Explainable-AI-Enabled Vulnerability Detec...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE/ACM International Conference on Automated Software Engineering : [proceedings] s. 1210 - 1212
Hlavní autoři: Nguyen, Tien N., Choo, Raymond
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.11.2021
Témata:
ISSN:2643-1572
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the target of cyber attackers. Hence, we propose a conceptual framework called 'Human-in-the-Loop Explainable-AI-Enabled Vulnerability Detection, Investigation, and Mitigation' (HXAI-VDIM). Specifically, instead of resolving complex scenario of security vulnerabilities as an output of an AI/ML model, we integrate the security analyst or forensic investigator into the man-machine loop and leverage explainable AI (XAI) to combine both AI and Intelligence Assistant (IA) to amplify human intelligence in both proactive and reactive processes. Our goal is that HXAI-VDIM integrates human and machine in an interactive and iterative loop with security visualization that utilizes human intelligence to guide the XAI-enabled system and generate refined solutions.
AbstractList The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the target of cyber attackers. Hence, we propose a conceptual framework called 'Human-in-the-Loop Explainable-AI-Enabled Vulnerability Detection, Investigation, and Mitigation' (HXAI-VDIM). Specifically, instead of resolving complex scenario of security vulnerabilities as an output of an AI/ML model, we integrate the security analyst or forensic investigator into the man-machine loop and leverage explainable AI (XAI) to combine both AI and Intelligence Assistant (IA) to amplify human intelligence in both proactive and reactive processes. Our goal is that HXAI-VDIM integrates human and machine in an interactive and iterative loop with security visualization that utilizes human intelligence to guide the XAI-enabled system and generate refined solutions.
Author Choo, Raymond
Nguyen, Tien N.
Author_xml – sequence: 1
  givenname: Tien N.
  surname: Nguyen
  fullname: Nguyen, Tien N.
  email: tien.n.nguyen@utdallas.edu
  organization: University of Texas at Dallas,Computer Science Department,Richardson,USA
– sequence: 2
  givenname: Raymond
  surname: Choo
  fullname: Choo, Raymond
  email: raymond.choo@utsa.edu
  organization: University of Texas-San Antonio,Department of Information Systems and Cyber Security,San Antonio,USA
BookMark eNo1kN9KwzAchaMouM09gQh9AFPzP81lmdMVKl44xbuRZL9qoEtHmw329k42rw4ffBw4Z4yuYhcBoXtKckqJeSzf55JKJnJGGM2N0kUhyAUaU6WkIJxrfolGTAmOqdTsBk2HITgijpbQRo3QcrHb2IhDxOkHcN112-yrrDBE61pYZ5-7NkJvXWhDOmRPkMCn0MWHrIp7GFL4tie0cZ29hn--RdeNbQeYnnOCPp7ny9kC128v1ayssWWFTlgq40RhCyXgb4s0XipuuaMgFRhmjAdQDLT1msNR9KwxjfXS6UZzDZRP0N2pNwDAatuHje0Pq_MJ_Bd8T1M4
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ASE51524.2021.9678840
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 1665403373
9781665403375
EISSN 2643-1572
EndPage 1212
ExternalDocumentID 9678840
Genre orig-research
GroupedDBID 29I
6IE
6IF
6IH
6IK
6IL
6IM
6IN
6J9
AAJGR
AAWTH
ABLEC
ACREN
ADYOE
ADZIZ
AFYQB
ALMA_UNASSIGNED_HOLDINGS
AMTXH
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
ID FETCH-LOGICAL-a287t-569b48a864e110959c563a3b1e56e9299cee62e7ac73e48ac2f9fac5b7f737e13
IEDL.DBID RIE
ISICitedReferencesCount 17
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000779309000130&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 03:02:55 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a287t-569b48a864e110959c563a3b1e56e9299cee62e7ac73e48ac2f9fac5b7f737e13
PageCount 3
ParticipantIDs ieee_primary_9678840
PublicationCentury 2000
PublicationDate 2021-Nov.
PublicationDateYYYYMMDD 2021-11-01
PublicationDate_xml – month: 11
  year: 2021
  text: 2021-Nov.
PublicationDecade 2020
PublicationTitle IEEE/ACM International Conference on Automated Software Engineering : [proceedings]
PublicationTitleAbbrev ASE
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib048844796
ssj0051577
Score 2.275818
Snippet The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the...
SourceID ieee
SourceType Publisher
StartPage 1210
SubjectTerms Analytical models
Artificial intelligence
Computational modeling
Explainable AI
Forensics
Human intelligence
Human-in-the-Loop
Investigation
Man-machine systems
Mitigation
Security
Vulnerability Detection
Title Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation
URI https://ieeexplore.ieee.org/document/9678840
WOSCitedRecordID wos000779309000130&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3Na8IwFH-o7LCT23Tsmxx2NGqbNGmOsikbOBHmxJuk7SsIoxWtg_33S9LqNthlPSUhlPBekveR93sP4F5r39csMkZOP1SUx2mfKolIFUYRC7VS6GpGzsdyMgkXCzWtQeeAhUFEF3yGXdt0b_lJHu-sq6ynzM1qDJI61KUUJVZrv3fMPuTcpY4rb2EjpqWsEDteX_UGr0Mz5Fsviu91qx_9qqjiBMqo-b-lnED7G5lHpgeZcwo1zM6guS_NQKqT2oKZc87TVUaNgkfHeb4mi8EzRYeUSsh8926zTbvA2E_yiIULyMo65EfaDdvVWUJeVvt-G95Gw9nDE60KKFBtDKGCBkJFPNSh4GiJEKg4EMxwxsNAoNGLlFmt8FHqWDI0E2M_VamOg0imkkn02Dk0sjzDCyCpUdWUZpz7CbPHPkqZ4Kn5Eo4iSPgltCyRlusyR8ayos_V38PXcGz5UGL6bqBRbHZ4C0fxR7Habu4cY78AuTOjcA
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da8IwED-cG2xPbtOx7_Vhj0bbJm2aR9kUZVWEOfFN0vYKwmjF1cH--yVp3QfsZX1KQijhLsl95H53APdSuq6kkTJy7EAQFqc2ERyRCIwiGkgh0NSMnId8MgkWCzGtQfsLC4OIJvgMO7pp3vKTPN5qV1lXqJtVGSR7sO8x5tolWmu3e9ROZMwkjyvvYSWoOa8wO44tur3nvhpytR_FdTrVr37VVDEiZdD432KOofWNzbOmX1LnBGqYnUJjV5zBqs5qE2bGPU9WGVEqHgnzfG0teiOCBiuVWPPtq843bUJjP6xHLExIVta2fiTe0F2ZJdZ4teu34GXQnz0MSVVCgUhlChXE80XEAhn4DDURPBF7PlW8cdDzUWlGQq3Wd5HLmFNUE2M3FamMvYinnHJ06BnUszzDc7BSpawJSRXhE6oPfpRSn6XqSxj6XsIuoKmJtFyXWTKWFX0u_x6-g8PhbBwuw9Hk6QqONE9KhN811IvNFm_gIH4vVm-bW8PkT2nRprc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=IEEE%2FACM+International+Conference+on+Automated+Software+Engineering+%3A+%5Bproceedings%5D&rft.atitle=Human-in-the-Loop+XAI-enabled+Vulnerability+Detection%2C+Investigation%2C+and+Mitigation&rft.au=Nguyen%2C+Tien+N.&rft.au=Choo%2C+Raymond&rft.date=2021-11-01&rft.pub=IEEE&rft.eissn=2643-1572&rft.spage=1210&rft.epage=1212&rft_id=info:doi/10.1109%2FASE51524.2021.9678840&rft.externalDocID=9678840