Penerapan Program Malware Untuk Pengambilan Data User Pada Sistem Operasi Windows Menggunakan Eksploitasi User Account Control (UAC)
Abstract
Keywords
Full Text:
PDFReferences
Andress, J., & Linn, R. (2017). Introduction to Python. In Coding for Penetration Testers.https://doi.org/10.1016/b978-0-12-805472-7.00002-4
Anitha, V., & Isakki, P. (2016). A survey on predicting user behavior based on web server log files in a web usage mining. 2016 International Conference on Computing Technologies and Intelligent Data Engineering, ICCTIDE 2016. https://doi.org/10.1109/ICCTIDE.2016.7725340
Calzarossa, M. C., & Massari, L. (2014). Analysis of header usage patterns of HTTP request messages. Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, 847–853. https://doi.org/10.1109/HPCC.2014.146
Rieck, K., Holz, T., & Willems, C. (2008). Detection of Intrusions and Malware, and Vulnerability Assessment. Detection of Intrusions and Malware, and Vulnerability Assessment, July. https://doi.org/10.1007/978-3-540-70542-0
Xu, T., Yuan, K., Wang, J., Niu, X., & Yang, Y. (2009). A real-time information hiding algorithm based on HTTP protocol. Proceedings of 2009 IEEE International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC2009, 618–622. https://doi.org/10.1109/ICNIDC.2009.5360969
Yile, F. (2016). Research on the Security Problem in Windows 7 Operating System. https://doi.org/10.1109/ICMTMA.2016.139
Zheng, X., Li, P., Chu, Z., & Hu, X. (2020). A Survey on Multi-Label Data Stream Classification. IEEE Access, 8(March 2020), 1249–1275. https://doi.org/10.1109/ACCESS.2019.2962059
Zhu, Z., & Peng, G. (2019). An analysis about the defects of windows UAC mechanism. In Communications in Computer and Information Science (Vol. 960). Springer Singapore. https://doi.org/10.1007/978-981-13-5913-2_17
DOI: https://doi.org/10.31284/p.snestik.2022.2824
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Citra Nurina Prabiantissa
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.