
on any CVE description. Building a representative
corpus would require to understand biases in current
databases in use. Second, in our current multi-model
approach, we manually fix the number of best match-
ing CAPEC to be returned by the framework. We pro-
pose to investigate how to reduce and adapt this num-
ber, filtering irrelevant CAPEC descriptions using
meta information from CAPEC and CVE databases
(e.g. abstraction level, keywords, etc.). Third, it
would be interesting to study the practical integra-
tion of such CVE-CAPEC matching tool, which po-
tentially induces matching errors, in a fully automated
test generation process towards full test automation of
industrial products.
ACKNOWLEDGEMENTS
The authors wish to express their gratitute to Raphael
Collado, Maxime Lecomte, Ulysse Vincenti, Victor
Breux, and Lalie Arnoud for the helpful discussions
and to the anonymous reviewers for their useful com-
ments. The work presented in this paper was funded
by the “France 2030” government investment plan
managed by the French National Research Agency,
under the reference “ANR-22-PECY-0005”.
REFERENCES
Bonomi, S., Ciavotta, A., Lenti, S., and Palma, A. (2025).
Beyond the Surface: An NLP-based Methodology to
Automatically Estimate CVE Relevance for CAPEC
Attack Patterns. arxiv (https://arxiv.org/abs/2501.
07131), Version Number: 1.
Das, S. S., Dutta, A., Purohit, S., Serra, E., Halappanavar,
M., and Pothen, A. (2022). Towards automatic map-
ping of vulnerabilities to attack patterns using large
language models. In IEEE International Symposium
on Technologies for Homeland Security (HST).
Das, S. S., Serra, E., Halappanavar, M., Pothen, A., and Al-
Shaer, E. (2021). V2w-bert: A framework for effec-
tive hierarchical multiclass classification of software
vulnerabilities. https://arxiv.org/abs/2102.11498.
Kanakogi, K., Washizaki, H., Fukazawa, Y., Ogata, S.,
Okubo, T., Kato, T., Kanuka, H., Hazeyama, A., and
Yoshioka, N. (2021a). Tracing CAPEC Attack Pat-
terns from CVE Vulnerability Information using Nat-
ural Language Processing Technique.
Kanakogi, K., Washizaki, H., Fukazawa, Y., Ogata, S.,
Okubo, T., Kato, T., Kanuka, H., Hazeyama, A., and
Yoshioka, N. (2021b). Tracing CVE Vulnerability In-
formation to CAPEC Attack Patterns Using Natural
Language Processing Techniques. volume 12, page
298.
Kanakogi, K., Washizaki, H., Fukazawa, Y., Ogata, S.,
Okubo, T., Kato, T., Kanuka, H., Hazeyama, A., and
Yoshioka, N. (2022). Comparative evaluation of nlp-
based approaches for linking capec attack patterns
from cve vulnerability information. In Applied Sci-
ences.
Kuppa, A., Aouad, L., and Le-Khac, N.-A. (2021). Linking
CVE’s to MITRE ATT&CK Techniques. In Proceed-
ings of the 16th International Conference on Avail-
ability, Reliability and Security, pages 1–12, Vienna
Austria. ACM.
MITRE.org (2023). CAPEC - Common Attack Pattern
Enumeration and Classification (CAPEC™). https://
capec.mitre.org/.
MITRE.org (2024). MITRE ATT&CK®. https://attack.
mitre.org/.
Naveed, H., Khan, A. U., Qiu, S., Saqib, M., Anwar, S., Us-
man, M., Akhtar, N., Barnes, N., and Mian, A. (2023).
A Comprehensive Overview of Large Language Mod-
els. arXiv (https://arxiv.org/abs/2307.06435), Version
Number: 10.
NIST (2025). NVD - Vulnerabilities. https://nvd.nist.gov/
vuln.
Pan, M., Li, B., Zou, Y., Yang, W., Wang, D., and Zhang,
T. (2023). Tracing Vulnerability to Attack Patterns
Using Text Similarity. In 2023 3rd International
Conference on Electronic Information Engineering
and Computer Science (EIECS), pages 1330–1334,
Changchun, China. IEEE.
Raffel, C., Shazeer, N., Roberts, A., Lee, K., Narang, S.,
Matena, M., Zhou, Y., Li, W., and Liu, P. J. (2023).
Exploring the Limits of Transfer Learning with a Uni-
fied Text-to-Text Transformer. arXiv:1910.10683 [cs]
(http://arxiv.org/abs/1910.10683).
sbert.net. Pretrained Models — Sentence Transformers doc-
umentation. https://www.sbert.net/docs/sentence tra
nsformer/pretrained models.html.
Shahid, M. and Debar, H. (2021). CVSS-BERT: Explain-
able Natural Language Processing to Determine the
Severity of a Computer Security Vulnerability from its
Description. arxiv (https://arxiv.org/abs/2111.08510)
Version Number: 1.
spaCy (2025). spaCy · Industrial-strength Natural Language
Processing in Python. https://spacy.io/.
Valence, A. (2023). ICAR, a categorical framework to con-
nect vulnerability, threat and asset managements.
A Multi-Model Approach to Enhance Automatic Matching of Vulnerabilities to Attack Patterns
665