POSTER: Construct macOS Cyber Range for Red/Blue Teams

Yi Hsien Chen, Yen Da Lin, Chung Kuan Chen, Chin Laung Lei, Chun Ying Huang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

More and more malicious apps and APT attacks now target macOS, making it crucial for researchers to develop threat countermeasures on macOS. In this paper, we attempt to construct a macOS cyber range for the evaluation of red team and blue team performances. Our proposed system is composed of three fundamental components: an attack-defense association graph, a Go language-based red team emulation tool, and a toolkit for blue team performance evaluation. We demonstrate the effectiveness of our proposed cyber range with real-world scenarios, and believe it will stimulate more research innovations on threat analysis for macOS.

Original languageEnglish
Title of host publicationProceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
PublisherAssociation for Computing Machinery, Inc
Pages934-936
Number of pages3
ISBN (Electronic)9781450367509
DOIs
StatePublished - 5 Oct 2020
Event15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020 - Virtual, Online, Taiwan
Duration: 5 Oct 20209 Oct 2020

Publication series

NameProceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020

Conference

Conference15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
CountryTaiwan
CityVirtual, Online
Period5/10/209/10/20

Keywords

  • blue team
  • cyber range
  • forensic
  • macos security
  • penetration testing
  • red team

Fingerprint Dive into the research topics of 'POSTER: Construct macOS Cyber Range for Red/Blue Teams'. Together they form a unique fingerprint.

Cite this