| dc.contributor.author | Çalık, Esra Bayazıt | |
| dc.contributor.author | Araç, Merve | |
| dc.date.accessioned | 2025-09-26T14:21:41Z | |
| dc.date.available | 2025-09-26T14:21:41Z | |
| dc.date.issued | 2025 | en_US |
| dc.identifier.citation | ÇALIK, Esra Bayazıt, Merve ARAÇ. "Implementing a Method for Privilege Escalation Attacks in Windows Systems". 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA), 2025. | en_US |
| dc.identifier.uri | https://hdl.handle.net/11352/5587 | |
| dc.description.abstract | Nowadays, the security of digital data is one of the
most important assets of the information age and is more
important than ever. Many operating system services require
special privileges to conduct their tasks. A configuration or
programming error made in a privileged service in the
operating system or software causes unauthorized access to
privileges. Especially in widely used operating systems such as
Windows, privilege escalation attacks are one of the main
threats to system security. In a worst-case scenario, these attacks
open the door for a remote attacker to take action that requires
high-level privilege, allowing them to switch from limited user
rights to administrator rights that provide full control over the
system by exploiting vulnerabilities or programming errors in
the system. This study provides a perspective on how privilege
escalation attacks occur in Windows operating systems, how
privilege escalation attacks occur by cracking user password
hashes in the Security Account Manager (SAM) file, and how
privilege separation can be an effective defense method against
such attacks. | en_US |
| dc.language.iso | eng | en_US |
| dc.publisher | IEEE | en_US |
| dc.relation.isversionof | 10.1109/ICHORA65333.2025.11017062 | en_US |
| dc.rights | info:eu-repo/semantics/embargoedAccess | en_US |
| dc.subject | Privilege Escalation | en_US |
| dc.subject | Information Security | en_US |
| dc.subject | Malware Attack | en_US |
| dc.subject | Cyber Security | en_US |
| dc.title | Implementing a Method for Privilege Escalation Attacks in Windows Systems | en_US |
| dc.type | article | en_US |
| dc.relation.journal | 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA) | en_US |
| dc.contributor.department | FSM Vakıf Üniversitesi, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | en_US |
| dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| dc.contributor.institutionauthor | Çalık, Esra Bayazıt | |
| dc.contributor.institutionauthor | Araç, Merve | |