Articles with "file based" as a keyword



Photo by arthurbizkit from unsplash

PhantomFS: File-Based Deception Technology for Thwarting Malicious Users

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2973700

Abstract: File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works… read more here.

Keywords: access; file; based deception; file based ... See more keywords

Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3153064

Abstract: File-based Time-of-Check to Time-of-Use (TOCTOU) race conditions are a well-known type of security vulnerability. A wide variety of techniques have been proposed to detect, mitigate, avoid, and exploit these vulnerabilities over the past 35 years.… read more here.

Keywords: file based; attack techniques; toctou vulnerabilities; defense attack ... See more keywords