To accomplish this, we collaborate with our industry partner and involve three security experts who spend a total of 3.5 person-months mapping each tool's detection rules to our proposed taxonomy and cross-validating the results.
Concretely, three security auditing experts independently carried out the mapping of the ground truth and detection rules. In instances where their mapping results differed, they engaged in discussions to reach a consensus or, as a secondary approach, adopted the majority's perspective to establish the final results.
The mapping result is displayed as follows: