Skip to main navigation
Skip to search
Skip to main content
Illinois Experts Home
LOGIN & Help
Link opens in a new tab
Search content at Illinois Experts
Home
Profiles
Research units
Research & Scholarship
Datasets
Honors
Press/Media
Activities
Forensic Analysis of Configuration-based Attacks
Muhammad Adil Inam
, Wajih Ul Hassan
, Ali Ahad
,
Adam Bates
, Rashid Tahir
,
Tianyin Xu
, Fareed Zaffar
Electrical and Computer Engineering
Information Trust Institute
Siebel School of Computing and Data Science
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Forensic Analysis of Configuration-based Attacks'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Forensic Analysis
100%
Configuration Change
100%
Effective Techniques
33%
System Level
33%
Control Applications
33%
Operating System
33%
Tracker
33%
Runtime Overhead
33%
Runtime Behavior
33%
Forensic Expert
33%
Cyber-attacks
33%
Linux
33%
System Call
33%
Event History
33%
Attack Scenario
33%
Attack Vectors
33%
Realistic Workload
33%
Configuration Files
33%
Traceback
33%
Causal Chain
33%
Introspection
33%
Real-world Attack
33%
Dynamic Modification
33%
Causal Analysis
33%
Semantic Gap
33%
Program Revision
33%
Causality Analysis
33%
Program Variables
33%
Information Flow Tracking
33%
Information Flow System
33%
Attack Attribution
33%
Computer Science
Configuration Change
100%
Analysis Technique
33%
Application Level
33%
Cyber Attack
33%
System Calls
33%
Attack Scenario
33%
Target Application
33%
Control Application
33%
Configuration File
33%
Operating System Level
33%
Causal Analysis
33%
semantic gap
33%
Program Variable
33%
Application Event
33%
Forensic Investigator
33%