| Property | Label | SubPropertyOf | InverseOf | Definition |
|---|---|---|---|---|
:abuses |
abuses | :uses |
x abuses y: The entity x applies an artifact y to a wrong thing or person; x applies y badly or incorrectly. | |
:access-mediated-by |
access-mediated-by | :associated-with |
:mediates-access-to |
x access-mediated-by y: The entity or resource x has its access regulated, controlled, or facilitated by entity y, which acts as an intermediary or gatekeeper to enforce access control policies. |
:accessed-by |
accessed-by | :associated-with:may-be-accessed-by |
:accesses |
x accessed-by y: The entity or resource x is accessed by entity y. |
:accesses |
accesses | :associated-with:may-access |
x accesses y: An subject x takes the action of reading from, writing into, or executing the stored information in the object y. Reads, writes, and executes are specific cases of accesses. | |
:addressed-by |
addressed-by | :associated-with |
:addresses |
x addressed-by y: Relates a resource x (e.g., network host, peripheral device, disk sector, a memory cell or other logical or physical entity) to a discrete address y in an address space that points to it. |
:addresses |
addresses | :associated-with |
x addresses y: Relates a pointer x to a digital artifact y located in the address space to which x points. The address space is part of some digital store, whether it be in memory, an image, or a persistent storage device. | |
:adds |
adds | :associated-with:may-add |
x adds y: The subject x adds a data object y, such as a file, to some other digital artifact, such as a directory. Examples include an agent or technique adding a record to a database. or a domain entry to a DNS server. | |
:analyzes |
analyzes | :associated-with:detects |
x analyzes y: The subject x break down object y into components or essential features, assessing y by quantitative methods, qualitative methods, or both. Usually the analysis is done in terms of some model or framework. | |
:associated-with |
associated-with | :may-be-associated-with |
x associated-with y: The subject x and object y are associated in some way. This is the most general definite relationship in d3fend (i.e., most general relationship that is not prefixed by 'may-'.) | |
:attached-to |
attached-to | :associated-with |
x attached-to y: A subject x is joined in close association to an object y. | |
:attack-may-be-countered-by |
attack-may-be-countered-by | :may-be-tactically-associated-with |
||
:authenticates |
authenticates | :associated-with:hardens |
x authenticates y: The subject x establishes the authenticity of some y. This relation indicates an authentication event has occurred. | |
:authorizes |
authorizes | :associated-with:hardens |
x authorizes y: A subject x grants authorization or clearance for an agent y to use an object. This relation indicates an authorization event has occurred. | |
:blocks |
blocks | :counters:filters |
x blocks y: The entity x blocks off the use of digital artifact y by reference to a block or allow list (or both.) | |
:broader |
broader | :semantic-relation |
x broader y: The entity x represents a more general or inclusive concept than entity y. | |
:broader-transitive |
broader-transitive | :semantic-relation |
x broader-transitive y: The entity x represents a more general concept than entity y, including indirect or hierarchical relationships where x encompasses y through intermediate entities. | |
:carried-by |
carried-by | :associated-with |
:carries |
x carried-by y: The information entity x is dependent upon the entity y for its storage, transport, or communication. Entity y serves as the necessary bearer or link from which x can be recovered or interpreted. |
:carries |
carries | :associated-with |
x carries y: The entity x serves as the bearer or link for information y, enabling y to be stored, transported, or communicated such that y can be recovered or interpreted from x | |
:caused-by |
caused-by | :associated-with |
:causes |
x caused-by y: The event or action x occurs as a consequence of event or action y. |
:causes |
causes | :associated-with |
x causes y: The event or action x brings about event or action y as a consequence. | |
:communicates-with |
communicates-with | :associated-with |
x communicates-with y: x and y exchange signals or data bidirectionally, enabling mutual awareness, coordination, or interaction. | |
:configures |
configures | :associated-with:hardens |
x configures y: The entity x sets the operational parameters of entity y, determining how y will operate. | |
:connected-to |
connected-to | :associated-with |
x connected-to y: The subject x shares a direct physical or logical link with object y such that communication is possible between them without intermediate routing. | |
:connects |
connects | :associated-with |
x connects y: The subject x joins system y by means of communication equipment (to some other system, typically the adversary-targeted host). | |
:contained-by |
contained-by | :associated-with:may-be-contained-by |
:contains |
x contained-by y: The entity x exists within or is physically or logically enclosed by entity y. |
:contains |
contains | :associated-with:may-contain |
x contains y: A core relation that holds between a whole x and its part y. Equivalent to relational concept 'has part' and thus transitive. | |
:controlled-by |
controlled-by | :associated-with |
:controls |
x controlled-by y: x's operation or behavior is directed or regulated by y. |
:controls |
controls | :associated-with |
x controls y: x directs or regulates y's operational state, behavior, or function. | |
:copies |
copies | :creates |
x copies y: An technique or agent x reproduces or makes and exact copy of some digital artifact y. | |
:copy-of |
copy-of | :associated-with |
x copy-of y: The subject x is a duplicate of the object y. | |
:counters |
counters | :may-counter |
||
:created-by |
created-by | :associated-with:may-be-created-by |
:creates |
x created-by y: The entity x is brought into existence, developed, or generated by entity y. |
:creates |
creates | :associated-with:may-create |
x creates y: The subject x bring into existence an object y. Some technique or agent x creates a persistent digital artifact y (as opposed to production of a consumable or transient object.); i.e., bring forth or generate | |
:d3fend-general-object-property |
d3fend-general-object-property | :d3fend-object-property |
||
:d3fend-kb-object-property |
d3fend-kb-object-property | :d3fend-object-property |
x d3fend-kb-object-property y: The object y is a d3fend knowledge base object property. These properties allow the linkage of knowledge and information supporting and illustrating the d3fend model. | |
:d3fend-object-property |
d3fend-object-property | |||
:d3fend-process-object-property |
d3fend-process-object-property | :d3fend-object-property |
||
:d3fend-tactical-verb-property |
d3fend-tactical-verb-property | :d3fend-object-property |
||
:d3fend-use-case-object-property |
d3fend-use-case-object-property | :d3fend-object-property |
||
:deceives |
deceives | :counters |
||
:deceives-with |
deceives-with | :d3fend-tactical-verb-property |
x deceives-with y: The entity x misleads or manipulates another entity using y as a tool, method, or mechanism to create false perceptions or understanding. | |
:decodes |
decodes | :associated-with |
x decodes y: Entity x transforms data y to a different form, usually through decompression. | |
:deletes |
deletes | :evicts:modifies |
x deletes y: A technique or agent x wipes out the digitally or magnetically recorded information of digital object y. | |
:dependent |
dependent | :associated-with |
x dependent y: A dependent y is an entity that requires the fulfillment of the requirements specified in dependency x. | |
:depends-on |
depends-on | :associated-with |
:has-dependent |
x depends-on y: The entity x is contingent on y being available; x relies on y. |
:detects |
detects | :counters:d3fend-tactical-verb-property |
x detects y: The entity x discovers the presence, occurrence, or state of entity y through observation or measurement. | |
:disables |
disables | :evicts:may-disable:modifies |
x disables y: The technique or agent x makes an entity y unable to perform its actions or capabilities. | |
:drives |
drives | :associated-with |
x drives y: The device driver x causes a system component y to function by controlling it. | |
:employed-by |
employed-by | :associated-with |
:employs |
x employed-by y: An entity x is put into service by a technique or agent y. Inverse of y employs x. |
:employs |
employs | :associated-with |
x employs y: The entity x makes purposeful use of entity y to perform a function. | |
:enabled-by |
enabled-by | :associated-with |
:enables |
x enabled-by y: A top level technique y enables a tactic x, that is, the property indicates that a technique y is used to put a particular tactic x into action. In other words, y renders x capable or able for some task. Inverse of enables. |
:enables |
enables | :associated-with |
x enables y: A top level technique x enables a tactic y, that is, the property indicates that a technique x is used to put a particular tactic y into action. In other words, x renders y capable or able for some task. | |
:encodes |
encodes | :associated-with |
x encodes y: Entity x transforms data y to a different form, usually through compression. | |
:encrypts |
encrypts | :associated-with:hardens |
x encrypts y: The entity x converts the ordinary representation of a digital artifact y into a secret code. | |
:end |
end | :d3fend-process-object-property |
||
:enforces |
enforces | :associated-with |
x enforces y: Technique x forces entity y to be compliant with a law, rule, or obligation. | |
:enumerates |
enumerates | :reads |
x enumerates y: The subject x takes the action of reading from a digital source y to acquire data and create a list of its contents. | |
:erases |
erases | :associated-with |
x erases y: A technique x removes recorded data from storage device y creating space for new data. | |
:evaluated-by |
evaluated-by | :associated-with |
:evaluates |
x evaluated-by y: The entity x is assessed and analyzed by entity y. |
:evaluates |
evaluates | :associated-with:may-evaluate |
x evaluates y: The entity x systematically assesses entity y to judge its state, quality, or risk. | |
:evicts |
evicts | :counters:d3fend-tactical-verb-property:may-evict |
x evicts y: The entity x forcibly removes entity y from the environment or resource where y was residing. | |
:exactly |
exactly | :semantic-relation |
x exactly y: The entity x is identical to or fully corresponds to entity y. | |
:excises |
excises | :associated-with |
x excises y: Technique x removes a section of entity y. | |
:executed-by |
executed-by | :associated-with |
:executes |
x executed-by y: The entity or function x is carried out, performed, or run by entity y. |
:executes |
executes | :accesses:may-execute:runs |
x executes y: The subject x takes the action of carrying out (executing) y, which is a single software module, function, or instruction. | |
:extends |
extends | :modifies |
x extends y: The entity x extend the scope or range or area of entity y, especially in the sense of widen the range of applications. | |
:filters |
filters | :associated-with:isolates |
x filters y: An technique or agent x removes some specified set of of entities from the content of a digital artifact y, by passing an artifact's content through a filter. A filter is a device that removes something from whatever passes through it. | |
:forges |
forges | :creates |
x forges y: An technique or agent x counterfeits a digital artifact y, such as a fake credential, with the intent to deceive. | |
:fork |
fork | :d3fend-process-object-property |
||
:hardens |
hardens | :counters:d3fend-tactical-verb-property |
x hardens y: The entity x fortifies entity y to reduce its weaknesses so y can better withstand attack or failure. | |
:has-account |
has-account | :owns |
x has-account y: The subject x has ownership or possession of some account y. | |
:has-agent |
has-agent | :has-participant |
x has-agent y: The event x occurs because agent y actively carries it out. | |
:has-audience |
has-audience | :d3fend-use-case-object-property |
||
:has-contribution |
has-contribution | :d3fend-kb-object-property |
||
:has-contributor |
has-contributor | :d3fend-kb-object-property |
||
:has-dependent |
has-dependent | :associated-with |
x has-dependent y: The entity x is relied upon or required by entity y. | |
:has-goal |
has-goal | :d3fend-use-case-object-property |
||
:has-input |
has-input | :has-participant |
:input-of |
x has-input y: An event x has input y iff y is an artifact that is present at the start of x, provides material or information required for x to begin, and during x either y's state is altered or the information content it bears is realized. |
:has-location |
has-location | :associated-with |
x has-location y: The entity x is situated in a particular spot or position y. | |
:has-mediator |
has-mediator | :has-participant |
x has-mediator y: The entity x relies on or is facilitated by entity y. | |
:has-member |
has-member | :d3fend-kb-object-property |
:member-of |
|
:has-operating-mode |
has-operating-mode | :associated-with |
x has-operating-mode y: The entity x is currently operating in or has the potential to be in operating mode y. | |
:has-output |
has-output | :has-participant |
:output-of |
x has-output y: An event x has output y iff y is an artifact that is present at the end of x, was not present in the same state at the start of x, and whose presence at the end is required for x to be considered complete; the change in state may arise either from a transformation of y itself or from the realization of the information content y bears. |
:has-participant |
has-participant | :associated-with |
:participates-in |
x has-participant y: The event x involves an object y as a participant, indicating that y plays some role in the event, whether actively, passively, or otherwise. |
:has-prerequisite |
has-prerequisite | :d3fend-use-case-object-property |
||
:has-procedure |
has-procedure | :d3fend-general-object-property |
||
:has-recipient |
has-recipient | :associated-with |
x has_recipient y: An agent y is the intended recipient and decoder of the information contained in communication x. | |
:has-sender |
has-sender | :associated-with |
x has_sender y: An agent y is the sender and encoder of the information contained in communication x. | |
:has-weakness |
has-weakness | :may-have-weakness |
:weakness-of |
x has-weakness y: The entity x exhibits a condition y that could, in some circumstances, lead to a vulnerability. |
:hides |
hides | :associated-with |
x hides y: A technique or operation x conceals the digital artifact y. | |
:identified-by |
identified-by | :associated-with |
:identifies |
x identified-by y: The entity x is recognized or described by entity y. |
:identifies |
identifies | :associated-with |
x identifies y: The entity x recognizes or brings attention to entity y, making it distinct or clear through naming, description, or discovery. | |
:impairs |
impairs | :associated-with |
x impairs y: The entity or action x hinders entity y by reducing its normal function, capacity, or availability. | |
:implemented-by |
implemented-by | :associated-with |
:implements |
x implemented-by y: The entity x is realized or brought into operation by entity y. |
:implements |
implements | :associated-with |
x implements y: The entity x realize entity y by putting its design or specification into effect. | |
:initiates |
initiates | :associated-with |
x initiates y: The entity or action x starts or triggers entity or function y, bringing it into action. | |
:injects |
injects | :executes |
x injects y: The subject x takes the action of exploiting a security flaw by introducing (injecting) y, which is code or data that will change the course of execution or state of a computing process to an alternate course or state. | |
:input-of |
input-of | :participates-in |
x input-of y: An artifact x is input of an event y iff x participates at the start of y, provides the material or information required for y to begin, and during y either x's state is altered or the information content it bears is realized. | |
:installs |
installs | :associated-with |
x installs y: An entity x sets up a digital artifact y for subsequent use. For example, an installation program can install application software. | |
:instructed-by |
instructed-by | :associated-with |
x instructed-by y: A subject x takes machine instructions from object y. | |
:instructs |
instructs | :associated-with |
x instructs y: A subject x delivers machine instructions to object y. | |
:interprets |
interprets | :executes:may-interpret |
x interprets y: The subject x interprets the executable script y. The sense of interprets is here 'Parse the source code and perform its behavior directly.' | |
:inventoried-by |
inventoried-by | :associated-with |
:inventories |
x inventoried-by y: The entity x is cataloged, recorded, or tracked by entity y. |
:inventories |
inventories | :associated-with |
x inventories y: The entity x systematically discovers entity y and records its presence and key details for tracking. | |
:invoked-by |
invoked-by | :associated-with:may-be-invoked-by |
:invokes |
x invoked-by y: The entity x is called, triggered, or activated by entity y. |
:invokes |
invokes | :executes:may-invoke |
x invokes y: The subject x invokes a system service y by use of an instruction object y that interrupts the program being executed and passes control to the operating system to perform that operation. | |
:isolates |
isolates | :associated-with:d3fend-tactical-verb-property |
x isolates y: The technique or agent x sets digital artifact y apart from other digital artifacts, sequestering y. | |
:kb-reference |
kb-reference | :d3fend-kb-object-property |
:kb-reference-of |
|
:kb-reference-of |
kb-reference-of | :d3fend-kb-object-property |
x kb-is-example-of y: The reference x is an example of technique y. | |
:limits |
limits | :restricts |
x limits y: An entity x specifies a designated limit beyond which some entity y cannot function or must be terminated. | |
:loaded-by |
loaded-by | :associated-with |
:loads |
x loaded-by y: The entity x is brought into memory by entity y. |
:loads |
loads | :associated-with |
x loads y: The technique or process x transfers a software from a storage y to a computer's memory for subsequent execution. | |
:manages |
manages | :associated-with |
x manages y: The technique or agent x watches and directs the use of a digital artifact y. | |
:mapped-by |
mapped-by | :associated-with |
:maps |
x mapped-by y: The entity x is linked to another entity by entity y. |
:maps |
maps | :may-map |
x maps y: The entity x discovers and records how entity y is arranged and interconnected. | |
:may-access |
may-access | :may-be-associated-with |
:may-be-accessed-by |
x may-access y: They entity x may access the thing y; that is, 'x accesses y' may be true. |
:may-add |
may-add | :may-be-associated-with |
x may-add y: They entity x may add the thing y; that is, 'x adds y' may be true. | |
:may-be-accessed-by |
may-be-accessed-by | :may-be-associated-with |
||
:may-be-associated-with |
may-be-associated-with | :d3fend-object-property |
x may-be-associated-with y: The subject x and object y may be associated in some way. | |
:may-be-contained-by |
may-be-contained-by | :may-be-associated-with |
:may-contain |
|
:may-be-created-by |
may-be-created-by | :may-be-associated-with |
:may-create |
|
:may-be-deceived-by |
may-be-deceived-by | :attack-may-be-countered-by |
:may-deceive |
|
:may-be-detected-by |
may-be-detected-by | :attack-may-be-countered-by |
:may-detect |
|
:may-be-evicted-by |
may-be-evicted-by | :attack-may-be-countered-by |
:may-evict |
|
:may-be-hardened-against-by |
may-be-hardened-against-by | :attack-may-be-countered-by |
:may-harden |
|
:may-be-invoked-by |
may-be-invoked-by | :may-be-associated-with |
:may-invoke |
|
:may-be-isolated-by |
may-be-isolated-by | :attack-may-be-countered-by |
:may-isolate |
|
:may-be-modified-by |
may-be-modified-by | :may-be-associated-with |
:may-modify |
|
:may-be-tactically-associated-with |
may-be-tactically-associated-with | :may-be-associated-with |
x may-be-tactically-associated-with y: the defensive action x may be a tactic that counters offensive action y. | |
:may-be-weakness-of |
may-be-weakness-of | :may-be-associated-with |
:may-have-weakness |
|
:may-contain |
may-contain | :may-be-associated-with |
to potentially have as contents or constituent parts; comprise; include. | |
:may-counter |
may-counter | :may-be-associated-with |
||
:may-counter-attack |
may-counter-attack | :may-be-tactically-associated-with |
||
:may-create |
may-create | :may-be-associated-with |
x may-create y: They entity x may create the entity y; that is, 'x creates y' may be true. | |
:may-deceive |
may-deceive | :may-counter-attack |
||
:may-detect |
may-detect | :may-counter-attack |
||
:may-disable |
may-disable | :may-evict |
||
:may-evaluate |
may-evaluate | :may-be-associated-with |
||
:may-evict |
may-evict | :may-counter:may-counter-attack |
||
:may-execute |
may-execute | :may-be-associated-with |
x may execute y: The subject x might take the action of carrying out (executing) y, which is a single software module, function, or instruction. | |
:may-harden |
may-harden | :may-counter-attack |
||
:may-have-weakness |
may-have-weakness | :may-be-associated-with |
||
:may-interpret |
may-interpret | :may-be-associated-with |
x may-interpret y: They entity x may interpret the thing y; that is, 'x interprets y' may be true. | |
:may-invoke |
may-invoke | :may-be-associated-with |
x may-invoke y: They entity x may invoke the thing y; that is, 'x invokes y' may be true. | |
:may-isolate |
may-isolate | :may-counter-attack |
||
:may-map |
may-map | :may-be-associated-with |
||
:may-modify |
may-modify | :may-be-associated-with |
x may-modify y: They entity x may modify the thing y; that is, 'x modifies y' may be true. | |
:may-produce |
may-produce | :may-be-associated-with |
x may-produce y: They entity x may produce the thing y; that is, 'x produces y' may be true. | |
:may-query |
may-query | :may-be-associated-with |
||
:may-run |
may-run | :may-be-associated-with |
x may-run y: They entity x may run the thing y; that is, 'x runs y' may be true. | |
:may-transfer |
may-transfer | :may-be-associated-with |
x may-transfer y: They entity x might send the thing y; that is, 'x transfers y' may be true. | |
:mediates-access-to |
mediates-access-to | :associated-with |
x mediates-access-to y: The entity x controls and brokers requests to reach entity y, enforcing the access rules that allow or deny it. | |
:member-of |
member-of | :d3fend-kb-object-property |
||
:modified-by |
modified-by | :associated-with:may-be-modified-by |
:modifies |
x modified-by y: The entity x is changed by entity y. |
:modifies |
modifies | :accesses:associated-with:may-modify |
x modifies y: A technique or agent x causes a digital object y to change; become different; or undertake a transformation. Afterwards, the data or state held by a digital object is changed. | |
:modifies-part |
modifies-part | :may-modify |
x modifies-part y: The entity x modifies a part of y. | |
:monitors |
monitors | :associated-with:detects |
x monitors y: The technique or agent x keep tabs on; keeps an eye on; or keep the digital artifact y under surveillance. | |
:narrower |
narrower | :semantic-relation |
x narrower y: The entity x represents a more specific or focused concept than entity y. | |
:narrower-transitive |
narrower-transitive | :semantic-relation |
x narrower-transitive y: The entity x represents a more specific concept than entity y, including indirect or hierarchical relationships where x is a subset of y through intermediate entities. | |
:neutralizes |
neutralizes | :associated-with:hardens |
x neutralizes y: The technique x makes the execution of actions of y ineffective by preventing or counterbalancing the effect of y. | |
:next |
next | :d3fend-process-object-property |
||
:obfuscates |
obfuscates | :evicts:modifies |
x obfuscates y: The technique x makes the digital artifact y unclear or obscure. Typically obfuscation is a way to hide a digital artifact from discovery, use, or both. | |
:operates |
operates | :associated-with |
x operates y: The entity x enables, activates, or controls the functioning or behavior of object y (operated entity), typically in accordance with the design or intended use of the operated entity. | |
:originates-from |
originates-from | :associated-with |
x originates-from y: The digital event or artifact x began its network transit from a physical location y. | |
:output-of |
output-of | :participates-in |
x output-of y: An artifact x is output of an event y iff x must be present when y concludes, was absent in the same state when x began, and y counts as complete only when x is available at its end. | |
:owns |
owns | :associated-with |
x owns y: The subject x has ownership or possession of some object y. | |
:participates-in |
participates-in | :associated-with |
x participates-in y: The object x takes part in the event y, signifying that x contributes to or is affected by the event’s occurrence in some way. | |
:powered-by |
powered-by | :depends-on |
:powers |
x powered-by y: x obtains its essential energy or force from y to perform its function or remain active. |
:powers |
powers | :has-dependent |
x powers y: x furnishes y with the energy or force required for y's functionality or operation. | |
:preceded-by |
preceded-by | :associated-with |
:precedes |
x preceded-by y: The event or action x occurs after event or action y in time. |
:precedes |
precedes | :associated-with |
x precedes y: The event or action x occurs before event or action y in time. | |
:process-ancestor |
process-ancestor | :process-property |
x process-ancestor y: The process y is a process ancestor of process x, indicating one or more process creation events were conducted were started at process y and subsequently created process x. | |
:process-image-path |
process-image-path | :process-property |
x process-image-path y: The filepath y is the process image path for the process x, indicating the path to the resource from which the process's image was loaded. | |
:process-parent |
process-parent | :process-ancestor |
x process-parent y: The process y created the process x (directly) with a create process event. | |
:process-property |
process-property | :associated-with |
x process-property y: Process x has the a process-property y. This is generalization for specific process object properties. | |
:process-user |
process-user | :process-property |
x process-user y: The process x has been executed by the user y. | |
:produced-by |
produced-by | :associated-with |
:produces |
x produced-by y: The entity x is created by entity y. |
:produces |
produces | :associated-with:may-produce |
x produces y: The subject entity x or process produces a data object y, which may be discrete digital object or a stream (e.g., a stream such as network traffic.) | |
:provider |
provider | :associated-with |
x provider y: A provider y is an entity that supplies a service, system, or data resources to a dependent entity x. | |
:quarantines |
quarantines | :associated-with |
x quarantines y: Technique x moves entity y to a place of isolation. | |
:queries |
queries | :associated-with:may-query |
x queries y: The entity x requests information or data from entity y. | |
:reads |
reads | :accesses |
x reads y: The subject x takes the action of reading from a digital source y to acquire data and placing it into volatile memory for processing. | |
:receives |
receives | :associated-with |
x receives y: The subject x acquires object y from a communication medium and transfers y into its local context for storage or processing. | |
:recorded-in |
recorded-in | :associated-with |
:records |
x recorded-in y: The event x is documented, logged, or otherwise preserved within the digital artifact y, which stores or encodes relevant data about the event. |
:records |
records | :associated-with |
x records y: The digital artifact x makes a record of events y; set down in permanent form. | |
:regenerates |
regenerates | :associated-with:hardens |
x regenerates y: The entity x discards the current digital artifact y and creates a new version that serves the same function. | |
:related |
related | :semantic-relation |
x related y: x has a symmetric associative relation to y. | |
:restores |
restores | :associated-with |
x restores y: The entity x returns entity y to its known-good or previous state. | |
:restricted-by |
restricted-by | :associated-with |
:restricts |
x restricted-by y: The entity x is limited, constrained, or regulated by entity y. |
:restricts |
restricts | :associated-with:isolates |
x restricts y: An entity x bounds the use of entity y. | |
:resume |
resume | :d3fend-process-object-property |
The agent or technique x continues a previous action on entity y. Usually occurs after suspension on y. | |
:resumes |
resumes | :associated-with |
The agent or technique x continues a previous action on entity y. Usually occurs after suspension on y. | |
:runs |
runs | :associated-with:may-run |
x runs y: To carry out a process or program y, as on a computer or a machine x; where y may be a large software assembly or a specific module or instruction. | |
:semantic-relation |
semantic-relation | :associated-with |
x semantic-relation y: The entity x is conceptually or meaningfully connected to entity y. | |
:signed-by |
signed-by | :validated-by |
:signs |
x signed-by y: The digital artifact x includes a signature generated by the entity y, certifying the authenticity and integrity of x. This relationship indicates that x has undergone a validation process by y, using cryptographic measures to ensure that x is trustworthy and unaltered since the signing by y. |
:signs |
signs | :validates |
x signs y: The entity x applies a digital signature to the digital artifact y, thereby asserting its validity, integrity, and authenticity. | |
:spoofs |
spoofs | :associated-with:deceives-with |
x spoofs y: The technique x creates a fake instance of a digital artifact y; that is, y is a decoy, fake, or counterfeit. | |
:start |
start | :d3fend-process-object-property |
||
:strengthens |
strengthens | :associated-with:hardens |
x strengthens y: The technique x make digital artifact y resistant (to harm or misuse.) | |
:summarizes |
summarizes | :associated-with |
x summarizes y: The sensor x summarizes a set y of events concerning digital artifacts over time. | |
:suspends |
suspends | :evicts |
x suspends y: The agent or technique x pauses entity y. | |
:terminates |
terminates | :associated-with:evicts |
x terminates y: The technique x brings to an end or halt to some activity y. | |
:transmits |
transmits | :associated-with |
x transmits y: The subject x actively emits object y onto a communication medium, rendering y observable and available for reception on that medium. | |
:unloads |
unloads | :evicts |
x unloads y: The technique or artifact performs the action of unloading some artifact (applications, kernel modules, or hardware drivers, etc.) from a computer's memory. | |
:unmounts |
unmounts | :associated-with |
x unmounts y: An operation x removes the access via computer system's file system the availability of files and directories on a storage artifact y. Unmounts reverse or undo prior mount operations. | |
:updates |
updates | :hardens:modifies |
x updates y: The technique x updates the software for component y. | |
:use-limits |
use-limits | :limits |
x use-limits y: An entity x specifies a designated number of uses beyond which some entity y cannot function or must be terminated. | |
:used-by |
used-by | :associated-with |
:uses |
x used-by y: is inverse of y uses x. |
:uses |
uses | :associated-with |
x uses y: An entity x puts into service a resource or implement y; makes y work or employ for a particular purpose or for its inherent or natural purpose. | |
:validated-by |
validated-by | :associated-with:hardens |
x validated-by y: The digital artifact x has its authenticity and correctness confirmed or verified by the technique, operation, or agent y. | |
:validates |
validates | :associated-with:hardens |
x validates y: The technique x proves the digital artifact y is valid; that is, x shows or confirms the validity of y. | |
:verifies |
verifies | :analyzes:associated-with |
x verifies y: A technique x confirms the truth of a digital artifact y. | |
:weakness-of |
weakness-of | :may-be-weakness-of |
||
:writes |
writes | :accesses |
x writes y: The subject x takes the action of writing to a digital artifact y to store data and placing it into persistent memory for later reference. |
Last active
December 24, 2025 15:39
-
-
Save ikiril01/99a78341d25ffd2dae4f5e4ebd726f01 to your computer and use it in GitHub Desktop.
D3FEND 1.3.0 Object Properties
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment