參考文獻 |
Reference
[1]Russell Brandom. Ukranian company that spread petya couldface criminal charges for vulnerability.https://www.theverge.com/2017/7/3/15916060/petya-medoc-vulnerability-ransomware-cyberattack. Accessed:2020/05/31.
[2]Tom Warren. Hackers hid malware in ccleaner software.https://www.theverge.com/2017/9/18/16325202/ccleaner-hack-malware-security. Accessed:2020/05/31.
[3]Charlie Osborne. Hijacked asus live update software installs back-doors on countless pcs worldwide. https://www.zdnet.com/article/supply-chain-attack-installs-backdoors-through-hijacked-asus-live-update-software/. Accessed: 2020/05/31.
[4]Siyavula Textbooks. Software installation.https://intl.siyavula.com/read/cat/grade-11-cat/hardware-software-and-computer-management/05-hardware-software-and-computer-management?id=sec5-2. Accessed: 2021/01/11.
[5]Margaret Rouse. End user license agreement (eula).https://searchcio.techtarget.com/definition/End-User-License-Agreement. Accessed: 2021/01/11.
[6]Oriana Pawlyk. Pay for more than 6,000 airmen de-layed over software glitch.https://www.military.com/daily-news/2019/08/08/pay-more-6000-airmen-
-over-software-glitch.html. Accessed: 2021/01/11.
[7]Clea Skopeliti. Thousands stranded at heathrow due tocheck-in systems meltdown.https://www.theguardian.com/uk-news/2020/feb/17/thousands-stranded-amid-heathrow-check-in-systems-meltdown. Accessed:2021/01/11.
[8]Susan Potter. Using binary delta compression (bdc) technology toupdate windows xp and windows server 2003.Microsoft Corp, 2005.81
[9]Susan Potter. Using binary delta compression (bdc) tech-nology to update windows xp and windows server 2003.https://web.archive.org/web/20040829073928/http://www.microsoft.com/downloads/details.aspx?FamilyID=4789196c-d60a-497c-ae89-101a3754bad6&DisplayLang=en. Ac-cessed: 2019/11/29.
[10]Microsoft Document. Enable third-party updates.https://docs.microsoft.com/en-us/configmgr/sum/deploy-use/third-party-software-updates. Ac-cessed: 2019/11/26.
[11]. Understanding the Difference Between .exe and .msi .https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=0e501eb2-b17e-471a-abcb-a638045342ce&CommunityKey=41d8253b-a238-4563-8718-ed7623beafbc&tab=librarydocuments. Accessed:2020/18/18.
[12]. Notepad++ for Windows.https://notepad-plus.en.softonic.com/. Ac-cessed: 2021/04/29.
[13]Emmanuel Gbenga Dada, Joseph Stephen Bassi, Haruna Chiroma,Adebayo Olusola Adetunmbi, Opeyemi Emmanuel Ajibuwa, et al.Machine learning for email spam filtering: review, approaches andopen research problems.Heliyon, 5(6):e01802, 2019.
[14]Wang Xiujuan, Zhang Chenxi, Zheng Kangfeng, Tang Haoyang, andTao Yuanrui. Detecting spear-phishing emails based on authentica-tion. In2019 IEEE 4th International Conference on Computer andCommunication Systems (ICCCS), pages 450–456. IEEE, 2019.
[15]Nasim Maleki.A Behavioral Based Detection Approach for Busi-ness Email Compromises. PhD thesis, UNIVERSITY OF NEWBRUNSWICK, 2020.
[16]Maryam Shuaib, Olawale Surajudeen Adebayo, Oluwafemi Osho,Ismaila Idris, John K Alhassan, Nadim Rana, et al. Whale opti-mization algorithm-based email spam feature selection method us-ing rotation forest algorithm for classification.SN Applied Sciences,1(5):390, 2019.82
[17]. AdBlocker Ultimate.https://adblockultimate.net/. Accessed:2020/18/19.
[18]Shuai Zhao, Achir Kalra, Chong Wang, Cristian Borcea, andYi Chen. Ad blocking whitelist prediction for online publishers.In2019 IEEE International Conference on Big Data (Big Data),pages 1711–1716. IEEE, 2019.
[19]Action Nechibvute and Courage Mudzingwa. Wireless sensor net-works for scada and industrial control systems. 2013.
[20]DongHo Kang, ByoungKoo Kim, JungChan Na, and KyoungSonJhang. Whitelists based multiple filtering techniques in scada sensornetworks.Journal of Applied Mathematics, 2014, 2014.
[21]Dick O’Brien. Istr ransomware 2017. Technical report, July 2017.
[22]David Moore, Vern Paxson, Stefan Savage, Colleen Shannon,S Staniford, and Nicholas Weaver. Inside the slammer worm. InIEEE Security & Privacy, volume 1, pages 33–39, July-August 2003.
[23]Adam Sedgewick, Murugiah Souppaya, and Karen Scarfone. Guideto application whitelisting. Technical report, October 2015.
[24]Microsoft Document. Applocker.https://docs.microsoft.com/zh-tw/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview. Accessed: 2020/05/25.
[25]Microsoft Documentation. Installutil.exe.https://docs.microsoft.com/en-us/dotnet/framework/tools/installutil-exe-installer-tool?redirectedfrom=MSDN.Accessed: 2021/04/27.
[26]Andrew Black. Application whitelist bypass.https://attackiq.com/2018/05/21/application-whitelist-bypass/. Accessed: 2021/04/27.
[27]Josphat Mutai. What is a dll file and how to openit.https://computingforgeeks.com/what-is-dll-file-and-how-to-open/. Accessed:2021/04/27.
[28]Raj Chandel. Windows exploitation: rundll32.exe.https://www.hackingarticles.in/windows-exploitation-rundll32-exe/. Accessed: 2021/04/27.83
[29]ANDY GREEN.The malware hiding in yourwindows system32 folder:More rundll32 andlol security defense tips.https://www.varonis.com/blog/the-malware-hiding-in-your-windows-system32-folder-more-rundll32-and-lol-security-defense-tips/.Accessed: 2021/04/27.
[30]Shanhong Liu. Global market share held by operating systemsfor desktop pcs, from january 2013 to january 2019.https://www.statista.com/statistics/218089/global-market-share-of-windows-7/. Accessed:2019/11/19.
[31]McAfee Knowledge Center. Differences between observation modeand update mode in application control.https://kc.mcafee.com/corporate/index?page=content&id=KB78223&locale=zh_TW. Accessed: 2021/03/11.
[32]Kaspersky Lab. About adaptive anomaly control.https://support.kaspersky.com/KESWin/11.1.1/en-US/175452.htm. Accessed: 2021/03/11.
[33]Long Cheng, Fang Liu, and Danfeng Yao. Enterprise data breach:causes, challenges, prevention, and future directions.Wiley In-terdisciplinary Reviews: Data Mining and Knowledge Discovery,7(5):e1211, 2017.
[34]TONY PEPPER.Accidental internal databreaches are on the rise. here’s how to pro-tect your business.https://www.cpomagazine.com/cyber-security/accidental-internal-data-breaches-are-on-the-rise-heres-how-to-protect-your-business/.Accessed: 2021/03/11.
[35]Adam Sedgewick, Murugiah Souppaya, Karen Scarfone, LarryFeldman, and Editors. Stopping malware and unauthorizedsoftware through application whitelisting.https://csrc.nist.gov/csrc/media/publications/shared/documents/itl-bulletin/itlbul2015-12.pdf. Accessed:2021/03/29.
[36]Keith Jarvis and Jason Milletary. Inside a targeted point-of-sale data breach.https://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf. Accessed: 2021/03/29.84
[37]Tracey Caldwell. Securing the point of sale.Computer Fraud &Security, 2014(12):15–20, 2014.
[38]Jim Beechey. Application whitelisting: Panacea or propaganda.Global Information Assurance Certification Paper. SANS Institute,2010.
[39]Himanshu Pareek, Sandeep Romana, and PRL Eswari. Applicationwhitelisting: approaches and challenges.International Journal ofComputer Science, Engineering and Information Technology (IJC-SEIT), 2(5):13–18, 2012.
[40]Josh Powers, Rhett Smith, Zafer Korkmaz, and Husam Ahmed.Whitelist malware defense for embedded control system devices. In2015 Saudi Arabia Smart Grid (SASG), pages 1–6. IEEE, 2015.
[41]Christopher Gates, Ninghui Li, Jing Chen, and Robert Proctor.Codeshield: towards personalized application whitelisting. InPro-ceedings of the 28th Annual Computer Security Applications Con-ference, pages 279–288, 2012.
[42]Seth AC DeCato. Increasing the security on non-networked groundsupport equipment: Analyzing the implementation of whitelistingprotection. In2016 IEEE AUTOTESTCON, pages 1–5. IEEE, 2016.
[43]Sandeep Romana, Amit Kumar Jha, Janardhan Reddy, HimanshuPareek, and PR Eswari. Practical application whitelisting.Journalof Information Assurance & Security, 10(1):48, 2015.
[44]Hasan Turaev, Pavol Zavarsky, and Bobby Swar. Prevention ofransomware execution in enterprise environment on windows os:Assessment of application whitelisting solutions. In2018 1st In-ternational Conference on Data Intelligence and Security (ICDIS),pages 110–118. IEEE, 2018.
[45]Ivanti. Rules items.https://help.ivanti.com/ap/help/en_US/am/10.1/Content/Application_Manager/Rule_Items.htm#ArgumentsEG. Accessed: 2020/05/25.85
[46]Ivanti. Mcafee application control 8.2.0 - windows product guide.https://docs.mcafee.com/bundle/application-control-8.2.0-product-guide-windows/page/GUID-38D1E508-5FDE-4AFA-A33E-3F63C16999AF.html#. Accessed: 2020/05/25.
[47]Kaspersky Lab. Kaspersky endpoint security for windows.https://www.kaspersky.com/small-to-medium-business-security/endpoint-windows. Accessed:2021/04/28.
[48]Kaspersky Lab. Application control rules.https://support.kaspersky.com/KESWin/11/en-US/128030.htm. Accessed: 2021/04/28.
[49]Kaspersky Lab. About database and application module up-dates.https://support.kaspersky.com/KESWin/11/en-US/128097.htm. Accessed:2021/04/29.
[50]Trend Micro. About endpoint application control.https://docs.trendmicro.com/en-us/enterprise/endpoint-application-control/2.0. Accessed:2020/04/13.
[51]Trend Micro. About trusted sources.https://docs.trendmicro.com/en-us/enterprise/endpoint-application-control-20/rulesandpolicies/rulesandpoliciesabout/rulesallowruletrustedsources.aspx. Accessed: 2020/04/13.
[52]William J Heinbockel, Ellen R Laderman, and Gloria J Serrao. Sup-ply chain attacks and resiliency mitigations.The MITRE Corpora-tion, 2017.
[53]Abel Yeboah-Ofori and Shareeful Islam. Cyber security threat mod-eling for supply chain organizational environments.future internet,11(3):63, 2019.
[54]Stephen Pritchard. Software supply chain attacks–ev-erything you need to know.https://portswigger.net/daily-swig/software-supply-chain-attacks-everything-you-need-to-know.Accessed:2021/04/07.
[55]Joram Borenstein Cristin Goodwin.Guarding againstsupply chain attacks—part 3: How software becomescompromised.https://www.microsoft.com/security/blog/2020/03/11/86
guarding-against-supply-chain-attacks-part-3-how-software-becomes-compromised/.Accessed: 2021/04/08.
[56]Electric Helpdesk.Examples of supply chain attacksand how to prevent them.https://www.electric.ai/blog/examples-of-supply-chain-attacks-how-to-prevent-them. Accessed: 2021/04/08.
[57]Microsoft Defender Security Research Team. Windows de-fender atp thwarts operation wilysupply software supplychain cyberattack.https://www.microsoft.com/security/blog/2017/05/04/windows-defender-atp-thwarts-operation-wilysupply-software-supply-chain-cyberattack/.Accessed: 2021/04/07.
[58]Microsoft Defender Security Research Team.Rivit.https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=TrojanDownloader:Win32/Rivit.A!dha. Accessed: 2021/04/07.
[59]GReAT, AMR from Global Research, and Kaspersky Lab Anal-ysis Team. Operation shadowhammer.https://securelist.com/operation-shadowhammer/89992/. Accessed: 2021/04/08.
[60]GReAT, AMR from Global Research, and Kasper-sky Lab Analysis Team.Operation shadowhammer:a high-profile supply chain attack.https://securelist.com/operation-shadowhammer-a-high-profile-supply-chain-attack/90380/. Accessed:2021/04/08.
[61]Lucian Constantin. Solarwinds attack explained: And whyit was so hard to detect.https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html.Accessed: 2021/04/08.
[62]FireEye Threat Research. Highly evasive attacker leveragessolarwinds supply chain to compromise multiple global victimswith sunburst backdoor.https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html. Accessed: 2021/04/08.
[63]Dan Chemistruck.How do you protect againstsupply chain attacks?assume you’re breached.87
https://www.infusedinnovations.com/blog/secure-intelligent-workplace/how-do-you-protect-against-supply-chain-attacks-assume-youre-breached. Accessed:2021/04/08.
[64]Scott Rose, Oliver Borchert, Stu Mitchell, and Sean Connelly. Zerotrust architecture.https://csrc.nist.gov/publications/detail/sp/800-207/final.Accessed: 2021/04/12.
[65]Zachary A.Collier and Joseph Sarkis. The zero trust supply chain:Managing supply chain risk in the absence of trust.InternationalJournal of Production Research, 0(0):1–16, 2021.
[66]Josh Zelonis. Don’t drink from a poisoned well—miti-gate supply chain risk with zero trust.https://go.forrester.com/blogs/dont-drink-from-a-poisoned-well-mitigate-supply-chain-risk-with-zero-trust/. Ac-cessed: 2021/04/07.
[67]Virsec. The need for zero trust workload protection.https://securityboulevard.com/2021/04/the-need-for-zero-trust-workload-protection/. Ac-cessed: 2021/04/12.
[68]Microsoft. Zero trust maturity model.https://www.microsoft.com/en-us/security/business/zero-trust. Accessed: 2021/04/12.
[69]OSR Open Systems Resources. An introduction to stan-dard and isolation minifilters.https://www.osr.com/nt-insider/2017-issue2/introduction-standard-isolation-minifilters/. Accessed: 2021/06/7.
[70]Bill Kindle. How to use traceroute in windows 10 (tracert).https://adamtheautomator.com/traceoute-windows-10/. Accessed: 2021/06/7.
[71]Google. Google safe browsing.https://safebrowsing.google.com/. Accessed:2021/03/22.
[72]Google. Safe browsing apis (v4).https://developers.google.com/safe-browsing/v4. Accessed: 2020/08/17.
[73]Microsoft Document. What is a driver?https://docs.microsoft.com/en-us/windows-hardware/drivers/gettingstarted/what-is-a-driver-. Accessed:2020/08/17.88
[74]McAfee. What is fileless malware?https://www.mcafee.com/enterprise/zh-tw/security-awareness/ransomware/what-is-fileless-malware.html. Ac-cessed: 2021/06/7.
[75]Microsoft Document. Overview of file sharing using the smb 3 proto-col in windows server.https://docs.microsoft.com/zh-tw/windows-server/storage/file-server/file-server-smb-overview. Accessed: 2020/08/17.
[76]Maxat Akbanov, Vassilios G Vassilakis, and Michael D Logothetis.Ransomware detection and mitigation using software-defined net-working: The case of wannacry.Computers & Electrical Engineer-ing, 76:111–121, 2019.
[77]Nikolay Pankov. Cve-2020-0796 new vulnerability in smb pro-tocol.https://www.kaspersky.com/blog/smb-311-vulnerability/33991/. Accessed:2020/08/17.
[78]Stefano Sebastio, Eduard Baranov, Fabrizio Biondi, Olivier De-courbe, Thomas Given-Wilson, Axel Legay, Cassius Puodzius, andJean Quilbeuf. Optimizing symbolic execution for malware behaviorclassification.Computers & Security, page 101775, 2020.
[79]OWASP. Fuzzing.https://owasp.org/www-community/Fuzzing. Accessed:2020/08/17.
[80]Google. Google cloud compute engine.https://cloud.google.com/compute.Accessed: 2021/06/02.
[81]Amazon. Cloud computing with aws.https://aws.amazon.com/what-is-aws/?nc1=h_ls. Accessed: 2021/06/02.
[82]Windows OS Hub. Using native package manager (winget) on win-dows 10.http://woshub.com/using-winget-package-manager-windows/. Accessed:2021/07/21.
[83]Chocolatey Software. The package manager for windows-chocolatey.https://chocolatey.org/. Accessed: 2021/07/21 |