Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®

dc.contributor.authorAdams, Emily K.
dc.date.accessioned2022-08-17T15:08:17Z
dc.date.available2022-08-17T15:08:17Z
dc.date.issued2022-08
dc.description.abstractIn this paper malicious tactics and techniques leveraged to explicitly manipulate the integrity of transient workflow data, data products, or derived metadata within scientific workflows are considered. This document leverages the MITRE ATT&CK Enterprise knowledge base of adversary tactics and techniques, based on real-world observations, as the foundation for a scoped analysis enumerating malicious attacks against data integrity within scientific workflows.en
dc.description.sponsorshipNational Science Foundation (NSF) - grant 1839900en
dc.identifier.urihttps://hdl.handle.net/2022/28045
dc.language.isoenen
dc.rightshttps://creativecommons.org/licenses/by-sa/4.0/en
dc.subjectcybersecurity, data integrity, scientific workflow, threat model, OSCRP, MITRE ATT&CKen
dc.titleIdentifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®en
dc.typeTechnical Reporten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Identifying Malicious Threats to Scientific Data Integrity Using MITRE ATT&CK®.pdf
Size:
154.76 KB
Format:
Adobe Portable Document Format
Description:
Can’t use the file because of accessibility barriers? Contact us with the title of the item, permanent link, and specifics of your accommodation need.