Trust but Verify: An Assessment of Vulnerability Tagging Services

Szu-Chun Huang

34th USENIX Security Symposium (USENIX Security '25) · Day 1 · Network Security 1: Censorship, Evasion, and Trustworthy Infrastructure