The Making of “The Advanced Persistent Threat You Have: Google Chrome”
نویسنده
چکیده
Google’s software update system can serve as a model Advanced Persistent Threat (APT). APTs often embed programs in a penetrated system. These programs wake up from time to time, call home, download additional programs and instructions to carry out, and modify systems. Google’s software update performs all these steps too. Furthermore, because the Google Chrome browser is so widely used and updated so frequently, Google’s update process provides analysts ample opportunity to test their data sources, tools, and skills for their ability to detect and reconstruct the “attack”. The paper “The Advanced Persistent Threat You Have: Google Chrome” made the claim that if the analyst could not perform the analysis of Google’s update system, they were probably not prepared for malicious APTs. The paper then provided a partial reconstruction of the update activity. This paper describes how the analysis in that first paper was performed. It describes the computer system, data collection, and analysis tool. It then shows how the tool and data were used to reconstruct the “attack”.
منابع مشابه
Chrome Extensions: Threat Analysis and Countermeasures
The widely popular browser extensions now become one of the most commonly used malware attack vectors. The Google Chrome browser, which implements the principles of least privileges and privilege separation by design, offers a strong security mechanism to protect malicious websites from damaging the whole browser system via extensions. In this study, we however reveal that Chrome’s extension se...
متن کاملP35: How to Manage Anxiety
Anxiety is a mental state that is elicited in anticipation of threat or potential threat. Sensations of anxiety are a normal part of human experience, but excessive or inappropriate anxiety can become an illness. Anxiety is part of the normal human experience. We may speculate that it served human survival during evolution by enhancing preparedness and alertness. However, anxious manifestations...
متن کاملYour Reputation Precedes You: History, Reputation, and the Chrome Malware Warning
Several web browsers, including Google Chrome and Mozilla Firefox, use malware warnings to stop people from visiting infectious websites. However, users can choose to click through (i.e., ignore) these malware warnings. In Google Chrome, users click through a fifth of malware warnings on average. We investigate factors that may contribute to why people ignore such warnings. First, we examine fi...
متن کاملMetabolomics: molecules of life, an introduction
Chemical biology Beginner 0.5 hour Join Reza Salek on an introductory tour of metabolomics. This webinar will help you understand what metabolomics is and how it can be used to inform biological research. It will also introduce the basics of the analytical technologies and data analysis methods commonly used in metabolomics. This webinar was recorded on 8 February 2017. It is best viewed in ful...
متن کاملUniProt: Exploring protein sequence and functional information - webinar
Proteins Beginner 1 hour In the first webinar [2], Sangya Pundir shows us how we can use UniProt [3] to explore protein sequence and functional information. The second webinar [4] showcases the latests updates to the UniProt website (webinar recorded on 9th Dec 2015). The third webinar [5] showcases UniProt's new Feature Viewer a novel tool which allows you to visualise protein sequence feature...
متن کامل