AEAS: Actionable Exploit Assessment System

📅 2025-09-22
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Security practitioners face challenges in assessing exploit samples from public vulnerability databases due to inconsistent sample quality and inefficient evaluation: existing metrics such as CVSS and EPSS fail to reflect practical exploitability, while manual triage is time-consuming and unscalable. This paper introduces the first automated scoring system for exploit actionability—i.e., the feasibility of deploying an exploit in real-world environments—integrating static code analysis with multi-dimensional feature modeling. The system generates interpretable, structured quantitative scores across three dimensions: usability, functional correctness, and deployment complexity, explicitly accounting for both exploit logic and environmental dependencies—avoiding opaque probabilistic estimation. Evaluated on a dataset of over 5,000 vulnerabilities, the approach achieves 100% top-3 recommendation accuracy and strong agreement with expert assessments, significantly outperforming CVSS and EPSS.

Technology Category

Application Category

📝 Abstract
Security practitioners face growing challenges in exploit assessment, as public vulnerability repositories are increasingly populated with inconsistent and low-quality exploit artifacts. Existing scoring systems, such as CVSS and EPSS, offer limited support for this task. They either rely on theoretical metrics or produce opaque probability estimates without assessing whether usable exploit code exists. In practice, security teams often resort to manual triage of exploit repositories, which is time-consuming, error-prone, and difficult to scale. We present AEAS, an automated system designed to assess and prioritize actionable exploits through static analysis. AEAS analyzes both exploit code and associated documentation to extract a structured set of features reflecting exploit availability, functionality, and setup complexity. It then computes an actionability score for each exploit and produces ranked exploit recommendations. We evaluate AEAS on a dataset of over 5,000 vulnerabilities derived from 600+ real-world applications frequently encountered by red teams. Manual validation and expert review on representative subsets show that AEAS achieves a 100% top-3 success rate in recommending functional exploits and shows strong alignment with expert-validated rankings. These results demonstrate the effectiveness of AEAS in supporting exploit-driven vulnerability prioritization.
Problem

Research questions and friction points this paper is trying to address.

Assessing inconsistent exploit artifacts in vulnerability repositories
Overcoming limitations of existing scoring systems like CVSS
Automating time-consuming manual exploit triage for security teams
Innovation

Methods, ideas, or system contributions that make the work stand out.

Automated system assessing exploits via static analysis
Extracts structured features from code and documentation
Computes actionability score for exploit prioritization
🔎 Similar Papers
No similar papers found.
X
Xiangmin Shen
Hofstra University
W
Wenyuan Cheng
Zhejiang University
Y
Yan Chen
Northwestern University
Z
Zhenyuan Li
Zhejiang University
Y
Yuqiao Gu
Zhejiang University
Lingzhi Wang
Lingzhi Wang
Associate Professor, Harbin Institute of Technology, Shenzhen
Artificial IntelligenceInformation SecurityNLPSocial Media Analysis
W
Wencheng Zhao
Ant Group
Dawei Sun
Dawei Sun
Ant Group
Jiashui Wang
Jiashui Wang
Zhejiang University
Software SecurityCyber SecurityLanguage AgentArtificial IntelligenceBusiness Security