2017
DOI: 10.1155/2017/4621587
|View full text |Cite
|
Sign up to set email alerts
|

PMCAP: A Threat Model of Process Memory Data on the Windows Operating System

Abstract: Research on endpoint security involves both traditional PC platform and prevalent mobile platform, among which the analysis of software vulnerability and malware is one of the important contents. For researchers, it is necessary to carry out nonstop exploration of the insecure factors in order to better protect the endpoints. Driven by this motivation, we propose a new threat model named Process Memory Captor (PMCAP) on the Windows operating system which threatens the live process volatile memory data. Compare… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…In [121], the authors, as in [118], emphasized the description of attacks and threats, without a detailed description of the model to which these threats and attacks can be applied. Additionally, in [127], on the contrary, the authors placed more emphasis on the description of the model than on the description of threats.…”
Section: Publicationmentioning
confidence: 99%
“…In [121], the authors, as in [118], emphasized the description of attacks and threats, without a detailed description of the model to which these threats and attacks can be applied. Additionally, in [127], on the contrary, the authors placed more emphasis on the description of the model than on the description of threats.…”
Section: Publicationmentioning
confidence: 99%
“…Low-level approaches are those that describe threats in detail. Such approaches may be based on the use of the list of attacks [15][16][17][18][19] or the list of attack scenarios [20]. Some approaches come down to analyzing the exploitation of vulnerabilities in the system [21][22][23].…”
Section: Related Workmentioning
confidence: 99%
“…is an added application. The threat of an element or link substitution is characterized by removing a vertex or an edge from the set X i or E j , respectively, and adding a vertex or an edge instead of the deleted one, i.e., for a set of applications, this is described by the sequence of Equations (15) and (16):…”
Section: Threats Of a Link Settings Changing-c S4ementioning
confidence: 99%
“…To protect intellectual property, many applications use multiple protection mechanisms to avoid external reverse analysis and leakage of implementation details. For malicious programs, it is also important to adopt detection techniques and other countermeasures to impede or mitigate the recognition of malicious behaviors [1][2][3].…”
Section: Introductionmentioning
confidence: 99%