{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T11:42:06Z","timestamp":1761824526352,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819744640"},{"type":"electronic","value":"9789819744657"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-4465-7_19","type":"book-chapter","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:01:46Z","timestamp":1720717306000},"page":"260-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Destructive Malwares on MITRE ATT&amp;CK Tactics for Cyber Warfare: A Brief Survey and Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-0707","authenticated-orcid":false,"given":"Seongmin","family":"Park","sequence":"first","affiliation":[]},{"given":"Myeongsu","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sarang","family":"Na","sequence":"additional","affiliation":[]},{"given":"Joonhyung","family":"Lim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,12]]},"reference":[{"key":"19_CR1","unstructured":"Bromiley, M.: SANS 2022 ATT&CK and D3FEND Report, SANS (2022)"},{"key":"19_CR2","unstructured":"MITRE: Enterprise matrix. https:\/\/attack.mitre.org\/matrices\/enterprise\/"},{"key":"19_CR3","unstructured":"Doherty, S., Gegeny, J., Spasojevic, B., Baltazar, J.: Hidden lynx\u2013professional hackers for hire, 17 September 2013. http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/hidden_lynx.pdf"},{"key":"19_CR4","unstructured":"Lemos, R.: Infoworld, 19 January 2011. http:\/\/www.infoworld.com\/t\/alware\/stuxnet-attack-more-effective-bombs-888"},{"key":"19_CR5","doi-asserted-by":"publisher","unstructured":"Chen, T., Abu-Nimeh, S.: Lessons from Stuxnet. Computer 44, 91\u201393 (2011). https:\/\/doi.org\/10.1109\/MC.2011.115","DOI":"10.1109\/MC.2011.115"},{"key":"19_CR6","unstructured":"Symantec: Stuxnet 0.5: The missing link (2013)"},{"key":"19_CR7","unstructured":"Bencsath, B., Pek, G., Buttyan, L., Felegyhazi, M.: Duqu: analysis, detection, and lessons learned. In: Proceedings of the 2nd ACM European Workshop on System Security (2012)"},{"key":"19_CR8","unstructured":"Symantec: W32.Duqu - The precursor to the next Stuxnet (2011)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Alshathry, S.: Cyber attack on Saudi Aramco. Int. J. Manag. Inf. Technol. 11, 3037\u20133039 (2016)","DOI":"10.24297\/ijmit.v11i5.5613"},{"issue":"2","key":"19_CR10","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1080\/00396338.2013.784468","volume":"55","author":"C Bronk","year":"2013","unstructured":"Bronk, C., Tikk, E.: The cyber attack on Saudi Aramco. Survival 55(2), 81\u201396 (2013)","journal-title":"Survival"},{"key":"19_CR11","unstructured":"Perlroth, N., Krauss, C.: A cyberattack in Saudi Arabia had a deadly goal. Experts fear another try. N. Y. Times 15 (2018)"},{"key":"19_CR12","unstructured":"Lgu, S.M., Azeem, E.A.: The secrets to MIMIKATZ - the credential dumper (2023)"},{"key":"19_CR13","unstructured":"Mimikatz. https:\/\/github.com\/gentilkiwi\/mimikatz"},{"key":"19_CR14","unstructured":"Symantec: What you need to know about the WannaCry ransomware. Threat Intelligence, October 2017. https:\/\/www.symantec.com\/blogs\/threat-intelligence\/wannacry-ransomware-attack"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Akbanov, M., Vassilakis, V.G., Logothetis, M.D.: WannaCry ransomware: analysis of infection, persistence, recovery prevention and propagation mechanisms. J. Telecommun. Inf. Technol., 113\u2013124 (2019)","DOI":"10.26636\/jtit.2019.130218"},{"key":"19_CR16","unstructured":"Norman, A.S.A.: The many faces of Gh0st Rat (2012)"},{"key":"19_CR17","unstructured":"Grange, W.: Digital vengeance: exploiting the most notorious C&C toolkits. In: Briefing presented at the Black Hat USA, Las Vegas, 27 July 2017"},{"key":"19_CR18","unstructured":"Kim, J.: North Korea mounts long-running hack of South Korea computers, says Seoul. Reuters (2016). https:\/\/www.reuters.com\/article\/us-northkorea-southkorea-cyber-idUSKCN0YZ0BE"},{"key":"19_CR19","unstructured":"MITRE: Software. https:\/\/attack.mitre.org\/software\/"},{"key":"19_CR20","unstructured":"Ruddy, M., Farahmand, H., Wahlstrom, E., Rabinovich, P., Chase, D., Krishnan, N., Mudra, G.: 2023 planning guide for identity and access management. Gartner (2022)"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-4465-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:04:08Z","timestamp":1720717448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-4465-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819744640","9789819744657"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-4465-7_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Okinawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isyou.biz\/conf\/mobisec23\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}