Articles with "privilege escalation" as a keyword



Mitigation of privilege escalation attack using kernel data relocation mechanism

Sign Up to like & get
recommendations!
Published in 2024 at "International Journal of Information Security"

DOI: 10.1007/s10207-024-00890-4

Abstract: Kernel memory corruption, which leads to a privilege escalation attack, has been reported as a security threat to operating systems. To mitigate privilege escalation attacks, several security mechanisms are proposed. Kernel address space layout randomization… read more here.

Keywords: escalation; privilege escalation; privileged information; relocation ... See more keywords

Elasticsearch-Based Threat Hunting to Detect Privilege Escalation Using Registry Modification and Process Injection Attacks

Sign Up to like & get
recommendations!
Published in 2025 at "Future Internet"

DOI: 10.3390/fi17090394

Abstract: Malicious actors often exploit persistence mechanisms, such as unauthorized modifications to Windows startup directories or registry keys, to achieve privilege escalation and maintain access on compromised systems. While information technology (IT) teams legitimately use these… read more here.

Keywords: threat hunting; registry; event; privilege escalation ... See more keywords