Published April 30, 2025 | Version CC-BY-NC-ND 4.0
Journal article Open

Promoting a Secure and Resilient Internet: Abuse Elevation Control Mechanism

  • 1. Cabinet Riding-Up, Programme PCP-ACEFA, Cameroun.

Description

Abstract: The Abuse Elevation Control Mechanism (AECM) is a critical cybersecurity concern, as it allows attackers to bypass security controls and gain unauthorized elevated privileges. This research explores attackers' primary methods to exploit compromised credentials, including account takeover, credential stuffing, and malware installation. It also highlights key techniques such as bypassing User Account Control (UAC) and exploiting setuid/setgid on Unix-like systems. The article discusses mitigation strategies, including audit and monitoring, privileged account management, and execution prevention. Finally, it provides insights into the future of AECM, emphasizing the increasing sophistication of attacks, emerging attack vectors, and stronger defensive mechanisms. This work aims to inform cybersecurity professionals about the risks of AECM and provide actionable strategies to mitigate these threats.

Files

D105414040325.pdf

Files (439.0 kB)

Name Size Download all
md5:b886aa201cf101dc5d5931614b1c5bda
439.0 kB Preview Download

Additional details

Identifiers

Dates

Accepted
2025-04-15
Manuscript received on 22 January 2025 | First Revised Manuscript received on 21 February 2025 | Second Revised Manuscript received on 16 March 2025 | Manuscript Accepted on 15 April 2025 | Manuscript published on 30 April 2025.

References