Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Software . 2025
License: CC BY
Data sources: ZENODO
ZENODO
Software . 2025
License: CC BY
Data sources: Datacite
ZENODO
Software . 2025
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Strengthening Microsoft Defender: Understanding Logical Evasion Threats

Authors: Son, Vi;

Strengthening Microsoft Defender: Understanding Logical Evasion Threats

Abstract

In the high-stakes arena of cybersecurity, Microsoft Defender stands as a cornerstone of Windows security, integrating a sophisticated array of defenses: the Antimalware Scan In terface (AMSI) for runtime script scanning, Endpoint Detection and Response (EDR) for real-time telemetry, cloud-based reputation services for file analysis, sandboxing for iso lated execution, and machine learning-driven heuristics for behavioral detection. Despite its robust architecture, attackers increasingly bypass these defenses—not by exploiting code-level vulnerabilities within the Microsoft Security Response Center’s (MSRC) ser vice boundaries, but by targeting logical vulnerabilities in Defender’s decision-making and analysis pipelines. These logical attacks manipulate the system’s own rules, turning its complexity into a weapon against it. This article series, Strengthening Microsoft Defender: Analyzing and Countering Logi cal Evasion Techniques, is designed to empower Blue Teams, security researchers, threat hunters, and system administrators with the knowledge to understand, detect, and neu tralize these threats. By framing logical evasion techniques as threat models and providing actionable Indicators of Compromise (IoCs) and defensive strategies, we aim to bridge the gap between attacker ingenuity and defender resilience. Our approach is grounded in ethical research, responsible disclosure, and practical application, ensuring that defenders can anticipate and counter sophisticated attacks without crossing legal or ethical lines.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average