Windows management instrumentation (WMI) security
Fileless attacks have been on a rise. A common similarity of all fileless attacks is that they use legitimate system software and one of it is called the Windows Management Instrumentation, also known as WMI. WMI based attacks are hard to track and well covert. There is no doubt that WMI based at...
Saved in:
Main Author: | Chew, Zhi Jie |
---|---|
Other Authors: | Lam Kwok Yan |
Format: | Final Year Project |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/74189 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Windows/Android synchronization Part 1
by: Ng, Zhi Ming
Published: (2015) -
The security study of Windows operating system
by: Ning, Wang.
Published: (2013) -
Performance evaluation of security software for Android smartphone
by: Ang, Jing Jie
Published: (2015) -
Innovative and secure smartphone applications
by: Jonathan Cherian Samraj
Published: (2013) -
Personal inventory management system
by: Sng, Aaron Zhi Wei
Published: (2017)