1. Keep an eye on new vulns that affect their systems
2. Patch vulnerable software as soon as possible
Then measurement
They tried. The recall was <40%
tl;dr they got accuracy .9764
1. Match software name: # of same words > # of different words "Internet Explorer" and "Microsoft Internet Explorer"
2. Measure version consistency: strict match vs loose match "1.1" and ".1 to 1.2"
With loose matching ~.95. With strict matching at most .8
No category is immune from inconsistency.
[There are lots of graphs and I decline to act like the curses library over livetweet ;)]
The rates are quite high, somtimes because of typoes, sometimes not keeping up with external sources (not updating reports when new vulnerable versions are added). Seems to be getting better in last 3 years
64 versions are confirmed vulnerable... but there were even more vulnerable that weren't reported at all. 😱
A: We did not do this sort of evaluation. First we'd need to measure the ground truth and may do that in future work.
A: No, because developers report vulnerabilities to different places.