{"id":87846,"date":"2019-02-17T20:02:50","date_gmt":"2019-02-18T04:02:50","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/02\/ibm-researchers-develop-a-technique-to-virtually-patch-vulnerabilities-ahead-of-threat"},"modified":"2019-02-17T20:02:50","modified_gmt":"2019-02-18T04:02:50","slug":"ibm-researchers-develop-a-technique-to-virtually-patch-vulnerabilities-ahead-of-threat","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/02\/ibm-researchers-develop-a-technique-to-virtually-patch-vulnerabilities-ahead-of-threat","title":{"rendered":"IBM researchers develop a technique to virtually patch vulnerabilities ahead of threat"},"content":{"rendered":"<p style=\"padding-right: 20px\"><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/ibm-researchers-develop-a-technique-to-virtually-patch-vulnerabilities-ahead-of-threat.jpg\"><\/a><\/p>\n<p>Researchers at IBM have recently devised a new technique to virtually patch security vulnerabilities before they are found. Their approach, presented at <a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-12085-6_9\">the International Workshop on Information and Operational Technology<\/a>, co-located with RAID18, leverages testing techniques for supervised learning-based data generation.<\/p>\n<p>\u201cWhile researching a solution to find security vulnerabilities in popular software, we paused to think about the following problem: We know practically and theoretically that it is impossible to find all vulnerabilities in an application, and the security community is in a constant race to discover those vulnerabilities in the hope of finding them before the bad guys do,\u201d Fady Copty, lead researcher of the study, told <i>TechXplore<\/i>. \u201cThis means enforcing regulations and constantly deploying <a href=\"https:\/\/techxplore.com\/tags\/security+patches\/\" rel=\"tag\" class=\"\">security patches<\/a> to systems.\u201d<\/p>\n<p>Deploying a <a href=\"https:\/\/techxplore.com\/tags\/security+patch\/\" rel=\"tag\" class=\"\">security patch<\/a> on an application is a tedious and time-consuming task, which entails a series of steps: identifying the vulnerable version of the application, managing this <a href=\"https:\/\/techxplore.com\/tags\/vulnerability\/\" rel=\"tag\" class=\"\">vulnerability<\/a>, delivering the <a href=\"https:\/\/techxplore.com\/tags\/patch\/\" rel=\"tag\" class=\"\">patch<\/a>, deploying it and then restarting the application. Often, patches are deployed over long periods of time, hence <a href=\"https:\/\/techxplore.com\/tags\/applications\/\" rel=\"tag\" class=\"\">applications<\/a> can remain vulnerable for a period after a vulnerability has been discovered. To speed up this process, researchers have recently introduced virtual patches, which are enforced using intrusion detection and prevention systems.<\/p>\n<p><!-- Link: <a href=\"https:\/\/techxplore.com\/news\/2019-02-ibm-technique-virtually-patch-vulnerabilities.html\">https:\/\/techxplore.com\/news\/2019&#45;02-ibm-technique-virtua...ities.html<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at IBM have recently devised a new technique to virtually patch security vulnerabilities before they are found. Their approach, presented at the International Workshop on Information and Operational Technology, co-located with RAID18, leverages testing techniques for supervised learning-based data generation. \u201cWhile researching a solution to find security vulnerabilities in popular software, we paused to [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1492],"tags":[],"class_list":["post-87846","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/87846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=87846"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/87846\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=87846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=87846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=87846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}