Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation

The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the target of cyber attackers. Hence, we propose a conceptual framework called 'Human-in-the-Loop Explainable-AI-Enabled Vulnerability Detec...

Full description

Saved in:
Bibliographic Details
Published in:IEEE/ACM International Conference on Automated Software Engineering : [proceedings] pp. 1210 - 1212
Main Authors: Nguyen, Tien N., Choo, Raymond
Format: Conference Proceeding
Language:English
Published: IEEE 01.11.2021
Subjects:
ISSN:2643-1572
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the target of cyber attackers. Hence, we propose a conceptual framework called 'Human-in-the-Loop Explainable-AI-Enabled Vulnerability Detection, Investigation, and Mitigation' (HXAI-VDIM). Specifically, instead of resolving complex scenario of security vulnerabilities as an output of an AI/ML model, we integrate the security analyst or forensic investigator into the man-machine loop and leverage explainable AI (XAI) to combine both AI and Intelligence Assistant (IA) to amplify human intelligence in both proactive and reactive processes. Our goal is that HXAI-VDIM integrates human and machine in an interactive and iterative loop with security visualization that utilizes human intelligence to guide the XAI-enabled system and generate refined solutions.
AbstractList The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the target of cyber attackers. Hence, we propose a conceptual framework called 'Human-in-the-Loop Explainable-AI-Enabled Vulnerability Detection, Investigation, and Mitigation' (HXAI-VDIM). Specifically, instead of resolving complex scenario of security vulnerabilities as an output of an AI/ML model, we integrate the security analyst or forensic investigator into the man-machine loop and leverage explainable AI (XAI) to combine both AI and Intelligence Assistant (IA) to amplify human intelligence in both proactive and reactive processes. Our goal is that HXAI-VDIM integrates human and machine in an interactive and iterative loop with security visualization that utilizes human intelligence to guide the XAI-enabled system and generate refined solutions.
Author Choo, Raymond
Nguyen, Tien N.
Author_xml – sequence: 1
  givenname: Tien N.
  surname: Nguyen
  fullname: Nguyen, Tien N.
  email: tien.n.nguyen@utdallas.edu
  organization: University of Texas at Dallas,Computer Science Department,Richardson,USA
– sequence: 2
  givenname: Raymond
  surname: Choo
  fullname: Choo, Raymond
  email: raymond.choo@utsa.edu
  organization: University of Texas-San Antonio,Department of Information Systems and Cyber Security,San Antonio,USA
BookMark eNo1kN9KwzAchaMouM09gQh9AFPzP81lmdMVKl44xbuRZL9qoEtHmw329k42rw4ffBw4Z4yuYhcBoXtKckqJeSzf55JKJnJGGM2N0kUhyAUaU6WkIJxrfolGTAmOqdTsBk2HITgijpbQRo3QcrHb2IhDxOkHcN112-yrrDBE61pYZ5-7NkJvXWhDOmRPkMCn0MWHrIp7GFL4tie0cZ29hn--RdeNbQeYnnOCPp7ny9kC128v1ayssWWFTlgq40RhCyXgb4s0XipuuaMgFRhmjAdQDLT1msNR9KwxjfXS6UZzDZRP0N2pNwDAatuHje0Pq_MJ_Bd8T1M4
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ASE51524.2021.9678840
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 1665403373
9781665403375
EISSN 2643-1572
EndPage 1212
ExternalDocumentID 9678840
Genre orig-research
GroupedDBID 29I
6IE
6IF
6IH
6IK
6IL
6IM
6IN
6J9
AAJGR
AAWTH
ABLEC
ACREN
ADYOE
ADZIZ
AFYQB
ALMA_UNASSIGNED_HOLDINGS
AMTXH
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
ID FETCH-LOGICAL-a287t-569b48a864e110959c563a3b1e56e9299cee62e7ac73e48ac2f9fac5b7f737e13
IEDL.DBID RIE
ISICitedReferencesCount 17
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000779309000130&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 03:02:55 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a287t-569b48a864e110959c563a3b1e56e9299cee62e7ac73e48ac2f9fac5b7f737e13
PageCount 3
ParticipantIDs ieee_primary_9678840
PublicationCentury 2000
PublicationDate 2021-Nov.
PublicationDateYYYYMMDD 2021-11-01
PublicationDate_xml – month: 11
  year: 2021
  text: 2021-Nov.
PublicationDecade 2020
PublicationTitle IEEE/ACM International Conference on Automated Software Engineering : [proceedings]
PublicationTitleAbbrev ASE
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib048844796
ssj0051577
Score 2.2757204
Snippet The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the...
SourceID ieee
SourceType Publisher
StartPage 1210
SubjectTerms Analytical models
Artificial intelligence
Computational modeling
Explainable AI
Forensics
Human intelligence
Human-in-the-Loop
Investigation
Man-machine systems
Mitigation
Security
Vulnerability Detection
Title Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation
URI https://ieeexplore.ieee.org/document/9678840
WOSCitedRecordID wos000779309000130&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA-bePA0dRO_ycHjsq1JmzTHoRsKOgZO2W2k6SsMpB2zE_zvfUm7qeDFS2lCKOG99H3l_d4j5CaO0YxAucekFYaFBh8xF4JBalSSZcbqgfXNJtRkEs_netog3R0WBgB88hn03Ku_y08Lu3Ghsr5GyYoOSZM0lZIVVmt7dvAchqEvHVdJYVTTStWInWCg-8PnEU5xF0XhQa_-0K-OKl6hjFv_28oh6Xwj8-h0p3OOSAPyY9Latmag9Z_aJjMfnGfLnKGBxx6LYkXnwwcGHimV0tfNm6s27RNjP-kdlD4hK-_SH2U33NDkKX1abscd8jIezW7vWd1AgRl0hEoWSZ2EsYllCI4IkbaRFEYkAUQS0C7SuFvJQRmrBOBCyzON7IkSlSmhIBAnZC8vcjglNJG4gGcpROjGRpnRMYBFa8bwJAmENWek7Yi0WFU1MhY1fc7_nr4gB44PFabvkuyV6w1ckX37US7f19eesV--TKPs
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwEA9zCvo0dRO_7YOPy7YmTdM8Dt3YcBsDp-xtpOkVBtKO2Qn-917Tbir44ktpQijhLr2v3O-OkPsgQDMC5R71DdfU0_gIGOcUIi3DONZGdYxtNiEnk2A-V9MKae6wMABgk8-glb_au_woNZs8VNZWKFnRIdkj-8LzWKdAa21PD55Ez7PF4wo5jIpayhKz43ZUu_vcwymWx1GY2yo_9aunilUp_dr_NnNMGt_YPGe60zonpALJKaltmzM45b9aJzMbnqfLhKKJR0dpunLm3SEFi5WKnNfNW15v2qbGfjqPkNmUrKTp_Ci8kQ91Ejnj5XbcIC_93uxhQMsWClSjK5RR4avQC3Tge5ATQSgjfK556ILwAS0jhbv1GUhtJAdcaFiskEEilLHkElx-RqpJmsA5cUIfF7A4AoGOrIi1CgAM2jOahaHLjb4g9ZxIi1VRJWNR0ufy7-k7cjiYjUeL0XDydEWOcp4UCL9rUs3WG7ghB-YjW76vby2TvwB0lqcz
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=IEEE%2FACM+International+Conference+on+Automated+Software+Engineering+%3A+%5Bproceedings%5D&rft.atitle=Human-in-the-Loop+XAI-enabled+Vulnerability+Detection%2C+Investigation%2C+and+Mitigation&rft.au=Nguyen%2C+Tien+N.&rft.au=Choo%2C+Raymond&rft.date=2021-11-01&rft.pub=IEEE&rft.eissn=2643-1572&rft.spage=1210&rft.epage=1212&rft_id=info:doi/10.1109%2FASE51524.2021.9678840&rft.externalDocID=9678840