Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation
The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the target of cyber attackers. Hence, we propose a conceptual framework called 'Human-in-the-Loop Explainable-AI-Enabled Vulnerability Detec...
Saved in:
| Published in: | IEEE/ACM International Conference on Automated Software Engineering : [proceedings] pp. 1210 - 1212 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.11.2021
|
| Subjects: | |
| ISSN: | 2643-1572 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the target of cyber attackers. Hence, we propose a conceptual framework called 'Human-in-the-Loop Explainable-AI-Enabled Vulnerability Detection, Investigation, and Mitigation' (HXAI-VDIM). Specifically, instead of resolving complex scenario of security vulnerabilities as an output of an AI/ML model, we integrate the security analyst or forensic investigator into the man-machine loop and leverage explainable AI (XAI) to combine both AI and Intelligence Assistant (IA) to amplify human intelligence in both proactive and reactive processes. Our goal is that HXAI-VDIM integrates human and machine in an interactive and iterative loop with security visualization that utilizes human intelligence to guide the XAI-enabled system and generate refined solutions. |
|---|---|
| AbstractList | The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the target of cyber attackers. Hence, we propose a conceptual framework called 'Human-in-the-Loop Explainable-AI-Enabled Vulnerability Detection, Investigation, and Mitigation' (HXAI-VDIM). Specifically, instead of resolving complex scenario of security vulnerabilities as an output of an AI/ML model, we integrate the security analyst or forensic investigator into the man-machine loop and leverage explainable AI (XAI) to combine both AI and Intelligence Assistant (IA) to amplify human intelligence in both proactive and reactive processes. Our goal is that HXAI-VDIM integrates human and machine in an interactive and iterative loop with security visualization that utilizes human intelligence to guide the XAI-enabled system and generate refined solutions. |
| Author | Choo, Raymond Nguyen, Tien N. |
| Author_xml | – sequence: 1 givenname: Tien N. surname: Nguyen fullname: Nguyen, Tien N. email: tien.n.nguyen@utdallas.edu organization: University of Texas at Dallas,Computer Science Department,Richardson,USA – sequence: 2 givenname: Raymond surname: Choo fullname: Choo, Raymond email: raymond.choo@utsa.edu organization: University of Texas-San Antonio,Department of Information Systems and Cyber Security,San Antonio,USA |
| BookMark | eNo1kN9KwzAchaMouM09gQh9AFPzP81lmdMVKl44xbuRZL9qoEtHmw329k42rw4ffBw4Z4yuYhcBoXtKckqJeSzf55JKJnJGGM2N0kUhyAUaU6WkIJxrfolGTAmOqdTsBk2HITgijpbQRo3QcrHb2IhDxOkHcN112-yrrDBE61pYZ5-7NkJvXWhDOmRPkMCn0MWHrIp7GFL4tie0cZ29hn--RdeNbQeYnnOCPp7ny9kC128v1ayssWWFTlgq40RhCyXgb4s0XipuuaMgFRhmjAdQDLT1msNR9KwxjfXS6UZzDZRP0N2pNwDAatuHje0Pq_MJ_Bd8T1M4 |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ASE51524.2021.9678840 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 1665403373 9781665403375 |
| EISSN | 2643-1572 |
| EndPage | 1212 |
| ExternalDocumentID | 9678840 |
| Genre | orig-research |
| GroupedDBID | 29I 6IE 6IF 6IH 6IK 6IL 6IM 6IN 6J9 AAJGR AAWTH ABLEC ACREN ADYOE ADZIZ AFYQB ALMA_UNASSIGNED_HOLDINGS AMTXH APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI M43 OCL RIE RIL |
| ID | FETCH-LOGICAL-a287t-569b48a864e110959c563a3b1e56e9299cee62e7ac73e48ac2f9fac5b7f737e13 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 17 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000779309000130&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 03:02:55 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a287t-569b48a864e110959c563a3b1e56e9299cee62e7ac73e48ac2f9fac5b7f737e13 |
| PageCount | 3 |
| ParticipantIDs | ieee_primary_9678840 |
| PublicationCentury | 2000 |
| PublicationDate | 2021-Nov. |
| PublicationDateYYYYMMDD | 2021-11-01 |
| PublicationDate_xml | – month: 11 year: 2021 text: 2021-Nov. |
| PublicationDecade | 2020 |
| PublicationTitle | IEEE/ACM International Conference on Automated Software Engineering : [proceedings] |
| PublicationTitleAbbrev | ASE |
| PublicationYear | 2021 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssib048844796 ssj0051577 |
| Score | 2.275818 |
| Snippet | The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1210 |
| SubjectTerms | Analytical models Artificial intelligence Computational modeling Explainable AI Forensics Human intelligence Human-in-the-Loop Investigation Man-machine systems Mitigation Security Vulnerability Detection |
| Title | Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation |
| URI | https://ieeexplore.ieee.org/document/9678840 |
| WOSCitedRecordID | wos000779309000130&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LawIxEA4qPfRkWy19k0OPRt3sbrI5Squ0YEWoLd4km52AUFaxa6H_vpPsalvopbckhBAmybwy3wwhtwkHEWbcMh1ozaI4wJawaKUYJW2aaeSavmrJWE4myXyupjXS2WNhAMAHn0HXNf1ffrYyW-cq6ynkrGiQ1EldSlFitXZ3B-9hFPnUcSUXRjEtZYXYCfqqN3ge4hB3XhQedKuFflVU8QJl1PzfVo5I-xuZR6d7mXNMapCfkOauNAOtXmqLzLxzni1zhgoeG69WazofPDLwSKmMvm7fXLZpHxj7Se-h8AFZeYf-SLvhujrP6NNy12-Tl9FwdvfAqgIKTKMhVLBYqDRKdCIicESIlYlFqMM0gFgA6kUKdys4SG1kCDjRcKusNnEqrQwlBOEpaeSrHM4IFRL6IaoH1lgZCSGVsaicWMk5xFwl6TlpOSIt1mWOjEVFn4u_hy_JoTuHEtN3RRrFZgvX5MB8FMv3zY0_2C_Nc6MM |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFG8QTfSECsZve_BIgXVbux6JQiACIRENN9J1rwmJ2QgOE_97226gJl68tU3TNK_t--r7vYfQfUSB-QnVRHpSkiD0TItpY6UowXWcSMM1XdWSEZ9MovlcTCuoucPCAIALPoOWbbq__CRTG-sqawvDWY1Bsof2wyCgnQKttb095iYGgUseV_BhI6g5LzE7Xke0u889M0StH4V6rXKpXzVVnEjp1_63mWPU-Mbm4elO6pygCqSnqLYtzoDLt1pHM-eeJ8uUGBWPjLJshefdIQGHlUrw6-bN5pt2obGf-BFyF5KVNvGPxBu2K9MEj5fbfgO99HuzhwEpSygQaUyhnIRMxEEkIxaAJUIoVMh86ccehAyMZiTMbhkFLhX3wUxUVAstVRhzzX0Onn-GqmmWwjnCjEPHNwqCVpoHjHGhtFFPNKcUQiqi-ALVLZEWqyJLxqKkz-Xfw3focDAbjxaj4eTpCh3ZMykQfteomq83cIMO1Ee-fF_fukP-AnmZplM |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=IEEE%2FACM+International+Conference+on+Automated+Software+Engineering+%3A+%5Bproceedings%5D&rft.atitle=Human-in-the-Loop+XAI-enabled+Vulnerability+Detection%2C+Investigation%2C+and+Mitigation&rft.au=Nguyen%2C+Tien+N.&rft.au=Choo%2C+Raymond&rft.date=2021-11-01&rft.pub=IEEE&rft.eissn=2643-1572&rft.spage=1210&rft.epage=1212&rft_id=info:doi/10.1109%2FASE51524.2021.9678840&rft.externalDocID=9678840 |