April 15, 2024, 4:11 a.m. | Yuntao Wang, Han Liu, Zhendong Li, Zhou Su, Jiliang Li

cs.CR updates on arXiv.org arxiv.org

arXiv:2309.09498v2 Announce Type: replace
Abstract: The rise of advanced persistent threats (APTs) has marked a significant cybersecurity challenge, characterized by sophisticated orchestration, stealthy execution, extended persistence, and targeting valuable assets across diverse sectors. Provenance graph-based kernel-level auditing has emerged as a promising approach to enhance visibility and traceability within intricate network environments. However, it still faces challenges including reconstructing complex lateral attack chains, detecting dynamic evasion behaviors, and defending smart adversarial subgraphs. To bridge the research gap, this paper proposes …

advanced advanced persistent threats apts arxiv assets auditing challenge challenges cs.cr cybersecurity cybersecurity challenge environments graph kernel network orchestration persistence persistent persistent threats provenance sectors solutions targeting threats traceability visibility

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Senior Software Engineer, Security

@ Niantic | Zürich, Switzerland

Consultant expert en sécurité des systèmes industriels (H/F)

@ Devoteam | Levallois-Perret, France

Cybersecurity Analyst

@ Bally's | Providence, Rhode Island, United States

Digital Trust Cyber Defense Executive

@ KPMG India | Gurgaon, Haryana, India

Program Manager - Cybersecurity Assessment Services

@ TestPros | Remote (and DMV), DC