Sign Up to like & get
recommendations!
0
Published in 2024 at "International Journal of Information Security"
DOI: 10.1007/s10207-024-00890-4
Abstract: Kernel memory corruption, which leads to a privilege escalation attack, has been reported as a security threat to operating systems. To mitigate privilege escalation attacks, several security mechanisms are proposed. Kernel address space layout randomization…
read more here.
Keywords:
escalation;
privilege escalation;
privileged information;
relocation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Future Internet"
DOI: 10.3390/fi17090394
Abstract: Malicious actors often exploit persistence mechanisms, such as unauthorized modifications to Windows startup directories or registry keys, to achieve privilege escalation and maintain access on compromised systems. While information technology (IT) teams legitimately use these…
read more here.
Keywords:
threat hunting;
registry;
event;
privilege escalation ... See more keywords