Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

[HTML][HTML] Multi-labeling of complex, multi-behavioral malware samples

P García-Teodoro, JA Gómez-Hernández… - Computers & …, 2022 - Elsevier
The use of malware samples is usually required to test cyber security solutions. For that, the
correct typology of the samples is of interest to properly estimate the exhibited performance …

Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis

E Rencelj Ling, JE Urrea Cabus, I Butun… - Proceedings of the 17th …, 2022 - dl.acm.org
This paper investigates methods to secure Remote Terminal Units (RTUs) which are the
building blocks of a smart grid systems-the next generation version to replace the power grid …

[HTML][HTML] Distributed attack deployment capability for modern automated penetration testing

J Hance, J Milbrath, N Ross, J Straub - Computers, 2022 - mdpi.com
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict
and even harder to prepare for. This paper presents work designed to prepare for the …

A multi-level cyber-security reference model in support of vulnerability analysis

S Hacks, M Kaczmarek-Heß, S de Kinderen… - … Conference on Enterprise …, 2022 - Springer
This paper reports on the second engineering cycle of a reference model for end-to-end
cyber-security by design in the electricity sector. In our previous work, we proposed a …

Analyzing enterprise architecture models by means of the meta attack language

A Aldea, S Hacks - International Conference on Advanced Information …, 2022 - Springer
The digital transformation exposes organizations to new threats endangering their business.
A way to uncover these threats is threat modeling and attack simulations. However …

A-DEMO: ATT&CK documentation, emulation and mitigation operations: deploying and documenting realistic cyberattack scenarios-a rootkit case study

S Karagiannis, A Tokatlis, S Pelekis… - Proceedings of the 25th …, 2021 - dl.acm.org
Cyberattacks aimed at critical infrastructures are a tangible threat. Malicious actors can
execute sequences of adversarial tactics, aiming to steal sensitive medical data or cause …

[PDF][PDF] Systematic design, deployment and evaluation of gamified cybersecurity learning environments

S Karagiannis - 2022 - researchgate.net
This research aims to validate the learning theory of constructivism and identify the possible
systematic approaches to design, deploy, and evaluate cybersecurity learning environments …

Cloud Security Requirement Based Threat Analysis

A Taha, A Lawall, N Suri - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Threat analysis (TA) is a process to identify, detect, and evaluate security vulnerabilities
systematically. Specifically, the TA, which focuses on threats that can potentially violate the …

Distributed Attack Deployment Functionality for Modern Automated Penetration Testing

JE Hance - 2023 - search.proquest.com
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict
and even harder to prepare for. This paper presents work designed to prepare for the …