Identifying authorship in malicious binaries: Features, challenges & datasets

J Gray, D Sgandurra, L Cavallaro… - ACM Computing …, 2024 - dl.acm.org
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …

Mitre att&ck: State of the art and way forward

B Al-Sada, A Sadighian, G Oligeri - ACM Computing Surveys, 2024 - dl.acm.org
MITRE ATT&CK is a comprehensive framework of adversary tactics, techniques, and
procedures based on real-world observations. It has been used as a foundation for threat …

AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports

Z Li, J Zeng, Y Chen, Z Liang - European Symposium on Research in …, 2022 - Springer
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …

[HTML][HTML] Cyber threat attribution using unstructured reports in cyber threat intelligence

E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a
challenging task as attacker uses different obfuscation and deception techniques to hide its …

Automated discovery and map** ATT&CK tactics and techniques for unstructured cyber threat intelligence

L Li, C Huang, J Chen - Computers & Security, 2024 - Elsevier
As cyber attacks are growing, Cyber Threat Intelligence (CTI) enhances the ability of security
systems to resist novel cyber threats. However, since most CTI is unstructured data written in …

Time for action: Automated analysis of cyber threat intelligence in the wild

G Siracusano, D Sanvito, R Gonzalez… - ar** of cve to att&ck and its application to cybersecurity
B Abdeen, E Al-Shaer, A Singhal, L Khan… - IFIP annual conference …, 2023 - Springer
Cybercriminals relentlessly pursue vulnerabilities across cyberspace to exploit software,
threatening the security of individuals, organizations, and governments. Although security …

An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers

AM Pirca, HS Lallie - Computers & Security, 2023 - Elsevier
Decision-makers struggle to understand cyber-security reports, sometimes leading to
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arxiv preprint arxiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

Open source intelligence for malicious behavior discovery and interpretation

YT Huang, CY Lin, YR Guo, KC Lo… - … on Dependable and …, 2021 - ieeexplore.ieee.org
Cyber threats are one of the most pressing issues in the digital age. There has been a
consensus on deploying a proactive defense to effectively detect and respond to adversary …