[EN] The main contribution of this paper is to provide an accurate taxonomy for Persistence techniques, which allows the detection of novel techniques and the identification of appropriate countermeasures. Persistence is ...
[EN] Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed ...
Alcañiz Bautista, Iván Carlo(Universitat Politècnica de València, 2022-09-05)
[ES] Con el incremento de amenazas y ataques cibernéticos en estos últimos años, y cobrando más importancia con el aumento del teletrabajo y la educación a distancia, el malware ha obtenido más presencia que nunca. Se ...
Blanc Clavero, Sara; Bonastre Pina, Alberto Miguel; Gil, Pedro(Elsevier, 2009)
This paper is focused on the validation by means of physical fault injection at pin-level of a time-triggered communication controller: the TTP/C versions C1 and C2. The controller is a commercial off-the-shelf product ...
[EN] Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise. These indicators are the main source of tactical cyber intelligence most organizations benefit from. They are expressed in ...