Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 239

Full-Text Articles in Physical Sciences and Mathematics

Implementing Unmanned Aerial Vehicles To Collect Human Gait Data At Distance And Altitude For Identification And Re-Identification, Donn E. Bartram Jan 2024

Implementing Unmanned Aerial Vehicles To Collect Human Gait Data At Distance And Altitude For Identification And Re-Identification, Donn E. Bartram

Graduate Theses, Dissertations, and Problem Reports

Gait patterns are a class of biometric information pertaining to the way a person moves and poses. Gait information is unique to each person and can be used to identify and reidentify people. Historically, this task has been achieved through the use of multiple ground-based imaging sensors. However, as Unmanned Aerial Vehicles (UAVs) advance, they present the opportunity to evolve the process of persons identification and re-identification. Collecting human gait data using UAVs at distances ranging from 20m to 500m and altitudes ranging from 0m to 120m is a challenging task. The current biometric data collection methods, primarily designed for …


Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo Jan 2024

Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo

Research outputs 2022 to 2026

Introduction: The research project's objective was to conduct a comprehensive horizon scan of Network Centric Warfare (NCW) technologies—specifically, Cyber, IoT/IoBT, AI, and Autonomous Systems. Recognised as pivotal force multipliers, these technologies are critical to reshaping the mission, design, structure, and operations of the Australian Defence Force (ADF), aligning with the Department of Defence (Defence)’s offset strategies and ensuring technological advantage, especially in the Indo-Pacific's competitive landscape.

Research process: Employing a two-pronged research approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding …


Cooperation Achievements And Outlook Of Oil And Gas Exploration And Development Under The Belt And Road Initiative, Zuoqian Wang, Qing Wei, Zhe Fan, Xi Chen, Yun Peng, Baolei Liu Oct 2023

Cooperation Achievements And Outlook Of Oil And Gas Exploration And Development Under The Belt And Road Initiative, Zuoqian Wang, Qing Wei, Zhe Fan, Xi Chen, Yun Peng, Baolei Liu

Bulletin of Chinese Academy of Sciences (Chinese Version)

This year marks the 10th anniversary of the Belt and Road Initiative proposed by General Secretary Xi Jinping. Taking the initiative as an opportunity, China’s oil companies have accumulated rich experience by accelerating their overseas deployment and carrying out extensive cooperation with countries along the route in the field of oil and gas energy. This study reviews the fruitful achievements of China’s oil companies in the transnational oil and gas exploration and development cooperation under the Belt and Road Initiative, summarizes the cooperation status and analyzes the potential and opportunities presented in the cooperation. In response to many challenges, such …


Changes In Global Energy Landscape And New Developments In Energy Science And Technology Amid Ukraine Crisis, Chao Wang, Fuquan Sun, Ye Xu, Xiangqiang Jiang Jun 2023

Changes In Global Energy Landscape And New Developments In Energy Science And Technology Amid Ukraine Crisis, Chao Wang, Fuquan Sun, Ye Xu, Xiangqiang Jiang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Energy is the blood vessel of an economy. The outbreak of the Ukraine crisis has triggered a regional energy supply crisis and a global energy market turmoil. As a result, the global energy landscape and energy science and technology development trends have undergone profound changes, with far-reaching impact on China’s science and technology strategies in the energy sector. Based on the study of energy strategy shift of the world’s major economies, this study focuses on research and analysis on the strategic trends of energy science and technology from the perspectives of international energy trade, global low-carbon transition and national energy …


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Measuring Radiation Protection: Partners From Across The Nuclear Enterprise Evaluate The Radiation Protection Of Us Army Vehicles, Andrew W. Decker, Robert Prins Apr 2023

Measuring Radiation Protection: Partners From Across The Nuclear Enterprise Evaluate The Radiation Protection Of Us Army Vehicles, Andrew W. Decker, Robert Prins

Faculty Publications

Recent mounting nuclear threats and postures from adversary nation-states, such as Russia, China, North Korea, and Iran, represent a clear danger to the interests and security of the United States of America and its Allies. To meet these threats, the 2022 Nuclear Posture Review requires the Department of Defense (DoD) to design, develop, and manage a combat-credible U.S. military which, among other prioritizations, is survivable. A survivable force can generate combat power despite adversary attacks. As such, the US Army must prepare today to set the conditions for successful conventional warfare on the nuclear battlefields of tomorrow. Our Army cannot …


Shale Oil Development And Utilization And Its Role In Energy Industry, Xusheng Guo, Maowen Li, Mengyun Zhao Jan 2023

Shale Oil Development And Utilization And Its Role In Energy Industry, Xusheng Guo, Maowen Li, Mengyun Zhao

Bulletin of Chinese Academy of Sciences (Chinese Version)

Shale oil boom in the United States has catapulted it from an importer of crude oil to a net exporter. Field applications show that both the shift in exploration paradigm from finding traps to targeting resource-rich petroleum source kitchens (i.e., "sweet spots") and the technological innovation represented by horizontal well multi-stage fracturing are among the key factors for the large-scale development of shale oil in the United States. Compared with marine shale oils in North America, China's lacustrine shale oil resources have great potential, but the endowment conditions are not optimal. Early exploration and development experience shows that the adaptive …


Hydrocarbon Security Strategy And Carbon Peak And Carbon Neutral Strategy: Relationship And Path, Wenzhi Zhao, Kun Liang, Kun Wang, Shiguo Lin, Zhixin Li Jan 2023

Hydrocarbon Security Strategy And Carbon Peak And Carbon Neutral Strategy: Relationship And Path, Wenzhi Zhao, Kun Liang, Kun Wang, Shiguo Lin, Zhixin Li

Bulletin of Chinese Academy of Sciences (Chinese Version)

A century of changes combined with the COVID-19 pandemic has sounded the alarm on energy security around the world. How to deeply understand the relationship between energy transition and energy security, and how to explore the path of China's energy security and the carbon peaking and carbon neutrality (abbreviated as "dual carbon") strategy have become a major problem. Based on detailed analyses of China's energy consumption predictions and dual carbon strategy requirements, this study proposes:(1) Energy security is the foundation of energy transition. The oil and gas shortage situation in China may persist for a long time. The "dual carbon" …


Problems And Countermeasures For Construction Of China’S Salt Cavern Type Strategic Oil Storage, Xilin Shi, Xinxing Wei, Chunhe Yang, Hongling Ma, Yinping Li Jan 2023

Problems And Countermeasures For Construction Of China’S Salt Cavern Type Strategic Oil Storage, Xilin Shi, Xinxing Wei, Chunhe Yang, Hongling Ma, Yinping Li

Bulletin of Chinese Academy of Sciences (Chinese Version)

Oil is an important strategic energy source, and the establishment of sufficient oil storage is a major need to ensure the political, economic and national defense security of the country. China's outer dependence for oil has exceeded 70% for three consecutive years, but the oil storage is extremely low. Underground salt caverns are internationally recognized as excellent places for large-scale oil storage, developed countries in Europe and the United States have built several salt cavern oil storages in the last century. The construction of salt cavern oil storage is expected to become an effective way to solve China's oil crisis. …


High-Quality Energy Development And Energy Security Under The New Situation For China, Guofa Wang, He Liu, Dandan Wang, Yihui Pang, Lixin Wu Jan 2023

High-Quality Energy Development And Energy Security Under The New Situation For China, Guofa Wang, He Liu, Dandan Wang, Yihui Pang, Lixin Wu

Bulletin of Chinese Academy of Sciences (Chinese Version)

Energy security is the cornerstone of national security and stable development, and high-quality energy development is the fundamental guarantee for long-term national economic growth. This study analyzes the complicated domestic and international environmental impacts of the ongoing Russia-Ukraine war, the United States energy rule, and the rigid demand for domestic energy consumption growth. It also analyzes the uncertainty of domestic energy transformation and development. Then, the study summarizes the enlightenment of China's energy development. Furthermore, based on China's energy structure and resource endowment, this study establishes an independent, controllable, safe and reliable integrated energy security system based on fossil energy, …


Role Of Transnational Oil And Gas Exploration And Development In Ensuring National Energy Security, Lirong Dou, Zuoqian Wang, Feng Gao, Xiaobing Liu Jan 2023

Role Of Transnational Oil And Gas Exploration And Development In Ensuring National Energy Security, Lirong Dou, Zuoqian Wang, Feng Gao, Xiaobing Liu

Bulletin of Chinese Academy of Sciences (Chinese Version)

United States is the founder of modern oil industry, which promoted the development of oil and gas in the world. By means of global layout of American oil companies, United States supercharges the backyard of North America while covets the forecourt of South America. United States realizes energy independence and opens energy hegemony during 70 years after World War II. On basis of reviewing the development history of American oil industry, this study analyzes the role of transnational oil and gas exploration, and development of Chinese national oil companies in ensuring national energy security. On the one hand, the entitlement …


Theory And Technology Considerations On High-Quality Development Of Coal Main Energy Security In China, Liang Yuan Jan 2023

Theory And Technology Considerations On High-Quality Development Of Coal Main Energy Security In China, Liang Yuan

Bulletin of Chinese Academy of Sciences (Chinese Version)

Coal is the ballast of energy security in China. In order to guarantee the high-quality development of energy security, China strongly supports the innovative development of coal industry. This study systematically summarizes the innovative achievements of China in six aspects, i.e., coal resource exploration technology, coal and gas co-mining theory and technology, typical dynamic disaster risk identification and early warning monitoring technology, integrated mining and intelligent mining technology and equipment, coal high-efficiency and clean utilization and coal-based clean energy high-efficiency conversion technology, coal and new energy multi-energy synergy technology. The study deeply analyzes the current challenges faced in above mentioned …


Mission Of New Energy Under Carbon Neutrality Goal In China, Caineng Zou, Yanpeng Chen, Bo Xiong, Hanlin Liu Jan 2023

Mission Of New Energy Under Carbon Neutrality Goal In China, Caineng Zou, Yanpeng Chen, Bo Xiong, Hanlin Liu

Bulletin of Chinese Academy of Sciences (Chinese Version)

Reducing greenhouse gas emissions, curbing the global temperature rise, and striving to achieve the goal of carbon neutrality are the initiatives and common pursuit of human beings confronting the climate change crisis. Carbon neutrality is a huge systemic project involving multiple disciplines and fields, and it requires a solid theoretical foundation and scientific methods to achieve the goal of carbon neutrality, hence the emergence of carbon neutrality science. The theoretical connotation of carbon neutrality includes two "dynamic balances", namely, the dynamic balance between global carbon emission and carbon absorption, and the dynamic balance between human development and the natural environment, …


Challenges Of International Turmoil Situation To China’S Energy Resource Security And Coping Strategies, Anjian Wang, Chunhui Wang Jan 2023

Challenges Of International Turmoil Situation To China’S Energy Resource Security And Coping Strategies, Anjian Wang, Chunhui Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

China is at a critical stage of development from late industrialization to modernization, and is still in the basic conditions of energy resources supporting the sustainable development of the national economy. The world today is facing unprecedented turmoil situation since the end of the cold war. The ongoing political and military crisis in Europe has accelerated the transformation of the world's geopolitical map and profoundly affected the global supply, demand and trade pattern of energy resources. Nowadays, the "four circles and two systems" pattern of global oil and gas supply and demand is undergoing major adjustments, and the competition in …


Climate Security Insights From The Covid-19 Response, Mark P. Nevitt Jan 2023

Climate Security Insights From The Covid-19 Response, Mark P. Nevitt

Faculty Articles

The climate change crisis and COVID-19 crisis are both complex collective action problems. Neither the coronavirus nor greenhouse gas (GHG) emissions respect political borders. Both impose an opportunity cost that penalizes inaction. They are also increasingly understood as nontraditional, novel security threats. Indeed, COVID-19’s human cost is staggering, with American lives lost vastly exceeding those lost in recent armed conflicts. And climate change is both a threat accelerant and a catalyst for conflict—a characterization reinforced in several climate-security reports. To counter COVID-19, the President embraced martial language, stating that he will employ a “wartime footing” to “defeat the virus.” Perhaps …


S-400s, Disinformation, And Anti-American Sentiment In Turkey, Russell "Alex" Korb, Saltuk Karahan, Gowri Prathap, Ekrem Kaya, Luke Palmieri, Hamdi Kavak, Richard L. Wilson (Ed.), Major Brendan Curran (Ed.) Jan 2023

S-400s, Disinformation, And Anti-American Sentiment In Turkey, Russell "Alex" Korb, Saltuk Karahan, Gowri Prathap, Ekrem Kaya, Luke Palmieri, Hamdi Kavak, Richard L. Wilson (Ed.), Major Brendan Curran (Ed.)

Political Science & Geography Faculty Publications

As social and political discourse in most countries becomes more polarized, anti-Americanism has risen not only in the Middle East and Latin America but also among the U.S. allies in Europe. Social media is one platform used to disseminate anti-American views in NATO countries, and its effectiveness can be magnified when mass media, public officials, and popular figures adopt these views. Disinformation, in particular, has gained recognition as a cybersecurity issue from 2016 onward, but disinformation can be manufactured domestically in addition to being part of a foreign influence campaign. In this paper, we analyze Turkish tweets using sentiment analysis …


Challenges And Measurements For Governance Of Modern Cyber Space Society, Pinghui Wang, Hongbin Pei, Junzhou Zhao, Tao Qin, Chao Shen, Dongliang Liu, Xiaohong Guan Dec 2022

Challenges And Measurements For Governance Of Modern Cyber Space Society, Pinghui Wang, Hongbin Pei, Junzhou Zhao, Tao Qin, Chao Shen, Dongliang Liu, Xiaohong Guan

Bulletin of Chinese Academy of Sciences (Chinese Version)

The rapid development of information technology has unprecedentedly created a prosperous cyber society and greatly enhanced productivity facilitated by social interaction. At the same time, many problems emerge in the cyber society, such as telecom fraud, privacy leakage, Internet pollution, and algorithmic discrimination. The problems bring new challenges to social order and security. In order to find the way of cyber society governance and promote the modernization of national governance, this paper first presents the analyses on the new problems encountered in the cyber society in three typical scenarios, i.e., identity governance, behavior governance, and algorithm governance, as well as …


Post Pandemic Cyberbiosecurity Threats From Terrorist Groups, Haley D. Dodge Dec 2022

Post Pandemic Cyberbiosecurity Threats From Terrorist Groups, Haley D. Dodge

Master's Theses

The research in this thesis explored the research question: Are United States (US) health systems accessible to cyber-bio terrorist attacks post-pandemic, within the context of the emerging discipline of cyberbiosecurity? Key findings of the analysis demonstrated how US health systems are more accessible to cyber-bio terrorist attacks specifically from cyber hacking groups based on the increasing sophistication of their cyber capabilities and the lack of cyber protection for biological systems. The concept of cyberbiosecurity was first introduced in 2018 by researchers exploring the converging threat landscape of the cyber and biology domains. As biology is growing more dependent upon vulnerable …


Recycling Of Critical Metals In Green And Low-Carbon Transition: Strategies And Countermeasures, Gang Liu, Litao Liu, Xin Ouyang, Qiance Liu, Xiang Li, Qiang Yan Nov 2022

Recycling Of Critical Metals In Green And Low-Carbon Transition: Strategies And Countermeasures, Gang Liu, Litao Liu, Xin Ouyang, Qiance Liu, Xiang Li, Qiang Yan

Bulletin of Chinese Academy of Sciences (Chinese Version)

As green and low-carbon transition has gained world-wide recognition and become the inherent requirement of fully building a modern socialist China, the consumption of critical metals will increase drastically in the next decades. Meanwhile, this will mean a continually increasing potential of critical metals recycling. Facing changes and pandemic unseen in a century and increasing geopolitical conflicts, it has become a strategic consensus on the national security level for Western countries like the United States and Europe Union to acknowledge and enhance the role of recycling in secure provision of critical metals. Here, in this study, we have discussed the …


China’S Rare Earth Supply And Demand Pattern And Balanced Utilization Strategy From Perspective Of Elements, Tao Dai, Tianming Gao, Bojie Wen Nov 2022

China’S Rare Earth Supply And Demand Pattern And Balanced Utilization Strategy From Perspective Of Elements, Tao Dai, Tianming Gao, Bojie Wen

Bulletin of Chinese Academy of Sciences (Chinese Version)

Rare earth is one of the key minerals in the global competition. At present, the global rare earth resources and supply pattern are changing, and Western countries are actively building a supply chain to replace China. This paper describes the evolution of China's rare earth supply and demand pattern from the perspective of elements, analyzes the dislocation of supply and demand of China's rare earth elements and the challenges it faces under the great changes, and puts forward the balanced utilization strategy of rare earth elements, which provides an optimization plan for promoting the globalization of the industrial chain and …


Challenges And Security Strategies Of China’S Critical Metals Supply For Carbon Neutrality Pledge, Weiqiang Chen, Peng Wang, Weiqiong Zhong Nov 2022

Challenges And Security Strategies Of China’S Critical Metals Supply For Carbon Neutrality Pledge, Weiqiang Chen, Peng Wang, Weiqiong Zhong

Bulletin of Chinese Academy of Sciences (Chinese Version)

The grand transition to low-carbon energy system is essential to bend the growing carbon emission and further achieve the dual carbon goals. Critical metals such as rare earth elements, lithium, cobalt, nickel, and platinum are widely considered as the material base to support low-carbon technologies. However, given the supply of those metals are scarce and risky, the emerging conflicts between their supply and demand have spurred global attention and competition among countries. This study aims to explore the linkage between critical metals and low-carbon energy systems with a particular focus on the bottlenecks of China's supply chains of those critical …


Security Of China’S Strategic And Critical Minerals Under Background Of Great Power Competition, Anjian Wang, Xiaojing Yuan Nov 2022

Security Of China’S Strategic And Critical Minerals Under Background Of Great Power Competition, Anjian Wang, Xiaojing Yuan

Bulletin of Chinese Academy of Sciences (Chinese Version)

Strategic and critical minerals are a type of resource that is essential to the country's economic development, indispensable to strategic emerging industries, and closely related to geopolitics. The types of strategic and critical minerals show some laws of spatial-temporal evolution due to the different stages of national economic development, economic structure and global industrial division of labor. Especially since the new century, with the rapid development of strategic emerging industries such as information technology, artificial intelligence and renewable energy, the connotation of strategic critical minerals has been continuously extended and closely connected with the industrial chain, highlighting its important position …


Analysis Of Critical Mineral Strategies Of Us And Eu And Their Enlightenment To China Nov 2022

Analysis Of Critical Mineral Strategies Of Us And Eu And Their Enlightenment To China

Bulletin of Chinese Academy of Sciences (Chinese Version)

As the world's major consumers of critical minerals and China's primary competitors, US and the EU have developed comprehensive and systematic critical mineral strategies, which have significant impact on China's resource security. To assist in developing China's critical mineral strategy, by thoroughly examining the critical mineral strategies of US and EU, this study finds their strategic attempts to slow China's development, summarizes their characteristics in the preparation, implementation mechanism, and main strategic measures, and, based on this, proposes suggestions for raising the safety level of China's critical minerals.


Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz Nov 2022

Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz

Faculty Publications

Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that …


Active Learning With Cybersecurity, Carole Shook May 2022

Active Learning With Cybersecurity, Carole Shook

TFSC Publications and Presentations

A global campus grant was obtained in Spring 2020 to develop modules for Cybersecurity. This presentation encompasses the use of Cyberciege and case studies that require active learning of students.


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …