Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®

Loading...
Thumbnail Image
Can’t use the file because of accessibility barriers? Contact us

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

In this paper malicious tactics and techniques leveraged to explicitly manipulate the integrity of transient workflow data, data products, or derived metadata within scientific workflows are considered. This document leverages the MITRE ATT&CK Enterprise knowledge base of adversary tactics and techniques, based on real-world observations, as the foundation for a scoped analysis enumerating malicious attacks against data integrity within scientific workflows.

Table of Contents

Description

Keywords

cybersecurity, data integrity, scientific workflow, threat model, OSCRP, MITRE ATT&CK

Citation

Journal

DOI

Link(s) to data and video for this item

Relation

Rights

This work is under a CC BY-SA license. You are free to copy and redistribute the material in any format as well as remix, transform, and build upon the material as long as you give appropriate credit to the original creator, provide a link to the license, and indicate any changes made. You must distribute any contributions under an identical license.