issues
search
mal-lang
/
coreLang
A probabilistic attack simulation language for the (abstract) IT domain
https://mal-lang.org/coreLang/
Other
11
stars
13
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
Investigate the attemptXFromSoftProdVulnerability Attack Steps
#102
andrewbwm
opened
3 months ago
1
Create Acknowledgements List
#101
andrewbwm
closed
9 months ago
4
Create a Requirements/Prerequisites Association for Vulnerabilities
#100
andrewbwm
opened
1 year ago
1
Introduce Inherent User Interaction for SoftwareVulnerabilities
#99
andrewbwm
closed
1 year ago
0
Remove Origin Association between Data and SoftwareProduct
#98
andrewbwm
closed
1 year ago
0
Fix Specific Access Application Network Connection Through Response
#97
andrewbwm
closed
1 year ago
0
Code review general refactoring
#96
andrewbwm
closed
1 year ago
0
Fix Data read, modify, deny from Application access
#95
skatsikeas
closed
1 year ago
0
Evaluate If SoftwareProduct has Extraneous Attack Steps
#94
andrewbwm
closed
1 year ago
0
Introduce Permission Requirements for `attemptApplicationRespondConnectThroughData` on `specificAccess`
#93
andrewbwm
closed
1 year ago
0
List of Suggestions for Future Languages/Versions
#92
andrewbwm
opened
2 years ago
1
Code Refactoring
#91
andrewbwm
closed
1 year ago
0
Find an Appropriate Tool to Conduct the Code Review In
#90
andrewbwm
closed
2 years ago
0
Have Data Encryption Bypass PayloadInspection
#89
andrewbwm
closed
2 years ago
0
Rework Network Connectivity into Separate Inspected and Uninspected Components
#88
andrewbwm
closed
2 years ago
0
Implement Malware Worm Replication via User to Other Hardware Systems.
#87
andrewbwm
closed
2 years ago
0
Introduce Dependence Association Between Applications and Data/Information.
#86
andrewbwm
closed
2 years ago
1
Rework Data in Data Attack Step Propagation
#85
andrewbwm
closed
2 years ago
0
Refactor coreLang.mal File into Multiple Files
#84
andrewbwm
closed
2 years ago
0
Rework the IAMObject Abstract Asset to Extend Information
#83
andrewbwm
closed
2 years ago
1
Have `IAMObject` asset extend `Information`
#82
andrewbwm
closed
2 years ago
0
Evaluate the Need for Additional Conditional Bypass Attack Steps
#81
andrewbwm
closed
1 year ago
1
Introduce Configuration of Applications
#80
andrewbwm
closed
2 years ago
1
Improve Credentials guessCredentials Functionality
#79
andrewbwm
closed
2 years ago
0
Defence bypasses
#78
andrewbwm
closed
2 years ago
1
Language and Code Review
#77
andrewbwm
closed
1 year ago
3
Homogenise Defence Behaviour
#76
andrewbwm
closed
2 years ago
4
Model Credentials that are involved in the authentication process.
#75
andrewbwm
closed
2 years ago
0
Refactor existing code into multiple files
#74
andrewbwm
closed
2 years ago
0
Rework attack steps on Application asset to follow the attempt-successful-impact pattern
#73
andrewbwm
closed
2 years ago
1
Resolve Directory Access Control branch
#72
andrewbwm
opened
2 years ago
3
Rework IAM assets to use a common abstract class
#71
andrewbwm
closed
2 years ago
0
Redesign System asset into Hardware asset
#70
andrewbwm
closed
2 years ago
0
Update data replication
#69
andrewbwm
closed
2 years ago
0
Evaluate if we want to integrate exploitability reports into the SoftwareVulnerability defences
#68
andrewbwm
opened
3 years ago
0
The disabled defence on the IDPS asset is not logically coherent
#67
andrewbwm
opened
3 years ago
0
Evaluate how an Application can suffer denial of service via Networking assets
#66
andrewbwm
closed
1 year ago
0
Unsafe user actions rework
#65
andrewbwm
closed
3 years ago
0
Introduce IDPS asset used to protect applications.
#64
andrewbwm
closed
3 years ago
1
Credentials Hashing
#63
andrewbwm
closed
3 years ago
0
Credentials Signing
#62
andrewbwm
closed
3 years ago
0
Credentials Signing
#61
andrewbwm
closed
3 years ago
2
How do we want to implement ransomware attacks
#60
andrewbwm
closed
3 years ago
2
Unhide accessNetworks
#59
joarjox
closed
3 years ago
1
Rework Credentials Multi-factor Authentication and Minor Fixes
#58
andrewbwm
closed
3 years ago
0
Add Information replication via Data asset
#57
andrewbwm
closed
3 years ago
2
How do we model VPNs in coreLang? Also, how do we represent authenticated network connections?
#56
andrewbwm
opened
3 years ago
1
Create an association between the PhysicalZone and Network.
#55
andrewbwm
closed
2 years ago
1
Design HardwareVulnerabilities to attach to the System asset.
#54
andrewbwm
closed
2 years ago
3
Document which attack steps should be used as entry points
#53
andrewbwm
opened
3 years ago
1
Next