Hovmark et al., 2020 - Google Patents
Towards Extending Probabilistic Attack Graphs with Forensic Evidence: An investigation of property list files in macOSHovmark et al., 2020
View PDF- Document ID
- 3700727784693708682
- Author
- Hovmark O
- Schüldt E
- Publication year
External Links
Snippet
Cyber-attacks against all types of systems is a growing problem in society. Since the Mac operating systems are becoming more common, so are the attacks against them. Probabilistic attack graphs are a way to model cyberattacks. The Meta Attack Language is a …
- 238000009114 investigational therapy 0 title description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Oz et al. | A survey on ransomware: Evolution, taxonomy, and defense solutions | |
US11489855B2 (en) | System and method of adding tags for use in detecting computer attacks | |
Milajerdi et al. | Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting | |
US11184374B2 (en) | Endpoint inter-process activity extraction and pattern matching | |
US10291634B2 (en) | System and method for determining summary events of an attack | |
US10154066B1 (en) | Context-aware compromise assessment | |
US9147073B2 (en) | System and method for automatic generation of heuristic algorithms for malicious object identification | |
Hassan | Ransomware revealed | |
US8955138B1 (en) | Systems and methods for reevaluating apparently benign behavior on computing devices | |
JP6134395B2 (en) | System and method for risk-based rules for application control | |
Casey et al. | Malware forensics field guide for Linux systems: digital forensics field guides | |
Mahmoud et al. | APTHunter: Detecting advanced persistent threats in early stages | |
Gunawan et al. | On the review and setup of security audit using Kali Linux | |
Atapour et al. | Modeling Advanced Persistent Threats to enhance anomaly detection techniques | |
Kazoleas et al. | A novel malicious remote administration tool using stealth and self-defense techniques | |
Gupta et al. | Developing a blockchain-based and distributed database-oriented multi-malware detection engine | |
Barker | Malware Analysis Techniques: Tricks for the triage of adversarial software | |
Tari et al. | Data Exfiltration threats and prevention techniques: Machine Learning and memory-based data security | |
Hovmark et al. | Towards Extending Probabilistic Attack Graphs with Forensic Evidence: An investigation of property list files in macOS | |
WO2023124041A1 (en) | Ransomware detection method and related system | |
Le et al. | A Basic Malware Analysis Process Based on FireEye Ecosystem. | |
Singhal | Analysis and Categorization of Drive-By Download Malware Using Sandboxing and Yara Ruleset | |
Fouzas | Evaluation of the open source HELK SIEM through a series of simulated attacks | |
Major | A Taxonomic Evaluation of Rootkit Deployment, Behavior and Detection | |
Alashjaee | An integrated framework for android based mobile device malware forensics |