[go: up one dir, main page]

Hovmark et al., 2020 - Google Patents

Towards Extending Probabilistic Attack Graphs with Forensic Evidence: An investigation of property list files in macOS

Hovmark et al., 2020

View PDF
Document ID
3700727784693708682
Author
Hovmark O
Schüldt E
Publication year

External Links

Snippet

Cyber-attacks against all types of systems is a growing problem in society. Since the Mac operating systems are becoming more common, so are the attacks against them. Probabilistic attack graphs are a way to model cyberattacks. The Meta Attack Language is a …
Continue reading at www.diva-portal.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/30144Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs

Similar Documents

Publication Publication Date Title
Oz et al. A survey on ransomware: Evolution, taxonomy, and defense solutions
US11489855B2 (en) System and method of adding tags for use in detecting computer attacks
Milajerdi et al. Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting
US11184374B2 (en) Endpoint inter-process activity extraction and pattern matching
US10291634B2 (en) System and method for determining summary events of an attack
US10154066B1 (en) Context-aware compromise assessment
US9147073B2 (en) System and method for automatic generation of heuristic algorithms for malicious object identification
Hassan Ransomware revealed
US8955138B1 (en) Systems and methods for reevaluating apparently benign behavior on computing devices
JP6134395B2 (en) System and method for risk-based rules for application control
Casey et al. Malware forensics field guide for Linux systems: digital forensics field guides
Mahmoud et al. APTHunter: Detecting advanced persistent threats in early stages
Gunawan et al. On the review and setup of security audit using Kali Linux
Atapour et al. Modeling Advanced Persistent Threats to enhance anomaly detection techniques
Kazoleas et al. A novel malicious remote administration tool using stealth and self-defense techniques
Gupta et al. Developing a blockchain-based and distributed database-oriented multi-malware detection engine
Barker Malware Analysis Techniques: Tricks for the triage of adversarial software
Tari et al. Data Exfiltration threats and prevention techniques: Machine Learning and memory-based data security
Hovmark et al. Towards Extending Probabilistic Attack Graphs with Forensic Evidence: An investigation of property list files in macOS
WO2023124041A1 (en) Ransomware detection method and related system
Le et al. A Basic Malware Analysis Process Based on FireEye Ecosystem.
Singhal Analysis and Categorization of Drive-By Download Malware Using Sandboxing and Yara Ruleset
Fouzas Evaluation of the open source HELK SIEM through a series of simulated attacks
Major A Taxonomic Evaluation of Rootkit Deployment, Behavior and Detection
Alashjaee An integrated framework for android based mobile device malware forensics