{"id":"https://openalex.org/W4220984173","doi":"https://doi.org/10.1109/kst53302.2022.9729085","title":"VAPE-BRIDGE: Bridging OpenVAS Results for Automating Metasploit Framework","display_name":"VAPE-BRIDGE: Bridging OpenVAS Results for Automating Metasploit Framework","publication_year":2022,"publication_date":"2022-01-26","ids":{"openalex":"https://openalex.org/W4220984173","doi":"https://doi.org/10.1109/kst53302.2022.9729085"},"language":"en","primary_location":{"id":"doi:10.1109/kst53302.2022.9729085","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kst53302.2022.9729085","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Knowledge and Smart Technology (KST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000888106","display_name":"K. Vimala","orcid":null},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Kankanok Vimala","raw_affiliation_strings":["School of ICT, Sirindhorn International Institute of Technology, Thammasat University,Phathumthani,Thailand","School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Phathumthani, Thailand"],"affiliations":[{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University,Phathumthani,Thailand","institution_ids":["https://openalex.org/I108108428"]},{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Phathumthani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082587353","display_name":"Somchart Fugkeaw","orcid":"https://orcid.org/0000-0001-7156-184X"},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Somchart Fugkeaw","raw_affiliation_strings":["School of ICT, Sirindhorn International Institute of Technology, Thammasat University,Phathumthani,Thailand","School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Phathumthani, Thailand"],"affiliations":[{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University,Phathumthani,Thailand","institution_ids":["https://openalex.org/I108108428"]},{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Phathumthani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5000888106"],"corresponding_institution_ids":["https://openalex.org/I108108428"],"apc_list":null,"apc_paid":null,"fwci":2.8631,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.92014895,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"69","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8347122669219971},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8248026967048645},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.6667894721031189},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.474944144487381},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.4739420711994171},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4561544954776764},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.4551635980606079},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3986549377441406},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.34405529499053955},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26908451318740845},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14952048659324646}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8347122669219971},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8248026967048645},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.6667894721031189},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.474944144487381},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.4739420711994171},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4561544954776764},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.4551635980606079},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3986549377441406},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.34405529499053955},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26908451318740845},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14952048659324646}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/kst53302.2022.9729085","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kst53302.2022.9729085","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Knowledge and Smart Technology (KST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1893205804","https://openalex.org/W1931900295","https://openalex.org/W2020831675","https://openalex.org/W2065283760","https://openalex.org/W2785411644","https://openalex.org/W2895967081","https://openalex.org/W3093731859","https://openalex.org/W3108531589","https://openalex.org/W4256020947","https://openalex.org/W6655881750"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W4306406268","https://openalex.org/W2886678613","https://openalex.org/W2537809616"],"abstract_inverted_index":{"Vulnerability":[0,82],"assessment":[1,83],"(VA)":[2],"and":[3,17,20,28,64,125,173,217],"penetration":[4],"test":[5,207],"(PenTest)":[6],"are":[7,22,30],"required":[8],"by":[9],"many":[10],"organizations":[11],"to":[12,42,48,86,110,128,153,165,184,189,220],"satisfy":[13],"their":[14],"security":[15],"auditing":[16],"compliance.":[18],"VA":[19,45,149],"PenTest":[21,53,103],"conducted":[23],"in":[24,51,95,116,131,168,192,209,223],"the":[25,33,37,44,52,73,77,88,96,106,113,132,148,169,182,186,195,197,211,230],"different":[26],"stage":[27],"they":[29],"done":[31],"through":[32],"software":[34],"tools.":[35],"Implementing":[36],"system":[38,68,200,231],"that":[39,71,91,229],"is":[40,55,99,108,232],"able":[41],"convert":[43],"scan":[46,78,150,212],"result":[47,79],"be":[49,87,93,129,166,190,221],"rendered":[50],"tool":[54,107],"a":[56,62,67,100,204],"real":[57],"challenge.":[58],"This":[59],"paper":[60],"proposes":[61],"design":[63],"development":[65],"of":[66,76,80,163,171,206],"called":[69],"VAPE-BRIDGE":[70,135],"provides":[72],"automatic":[74],"conversion":[75],"Open":[81,117],"scanner":[84],"(OpenVAS)":[85],"exploitable":[89],"scripts":[90],"will":[92],"executed":[94,191],"Metasploit":[97],"which":[98],"widely-used":[101],"opensource":[102],"program.":[104],"Specifically,":[105],"designed":[109],"automatically":[111],"extract":[112],"vulnerabilities":[114,164],"listed":[115],"Web":[118],"Application":[119],"Security":[120],"Project":[121],"10":[122],"(OWASP":[123],"10)":[124],"exploit":[126,187],"them":[127],"tested":[130,202,222],"Metasploit.":[133,193,224],"Our":[134],"encompasses":[136],"three":[137],"main":[138],"components":[139],"including":[140],"(1)":[141],"Scan":[142],"Result":[143],"Extraction":[144],"responsible":[145,159,179],"for":[146,160,180,235],"extracting":[147],"results":[151,213,219,227],"related":[152],"OWASP10":[154],"(2)":[155],"Target":[156],"List":[157],"Repository":[158],"retaining":[161],"lists":[162],"used":[167],"process":[170],"Metasploit,":[172],"(3)":[174],"Automated":[175],"Shell":[176],"Scripts":[177],"Exploitation":[178],"generating":[181],"script":[183],"render":[185],"module":[188],"For":[194],"implementation,":[196],"VAPE-Bridge":[198],"protype":[199],"was":[201],"with":[203],"number":[205],"cases":[208],"converting":[210],"into":[214],"shell":[215],"code":[216],"rendering":[218],"The":[225],"experimental":[226],"showed":[228],"functionally":[233],"correct":[234],"all":[236],"cases.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
