REFERENCES
Amoroso, E. G. (1994). Fundamentals of Computer
Security Technology. USA: Prentice-Hall.
Barlas, Yaman. (1996). Formal aspects of model validity
and validation in system dynamics. System Dynamics
Review, 12(3), 183-210.
Baskerville, Richard, Kaul, Mala, & Storey, Veda. (2017).
Establishing Reliability in Design Science Research.
Chester, Adam. (2019). Azure AD Connect for Red
Teamers. Retrieved from https://blog.xpnsec.
com/azuread-connect-for-redteam/
Dawood, Harith A. (2014, 29-30 Dec. 2014). Graph Theory
and Cyber Security. Paper presented at the 2014 3rd
International Conference on Advanced Computer
Science Applications and Technologies.
Edgar, Thomas W., & Manz, David O. (2017). Research
Methods for Cyber Security. Cambridge, MA, United
States: Syngress.
Eilam, Eldad. (2005). Reversing: secrets of reverse
engineering: John Wiley & Sons.
Felton, Matt. (2017). Azure AD Pass-through
Authentication – How does it work? Part 2. Retrieved
from https://journeyofthegeek.com/tag/azure-pass-
through-authentication/
Järvinen, Pertti. (2018). On Research Methods. Retrieved
from https://learning2.uta.fi/pluginfile.php/712390/
mod_resource/content/4/On%20research%20methods.
pdf
Kalendarov, Ilan, & Beber, Elad. (2024). Double Agent:
Exploiting Pass-through Authentication Credential
Validation in Azure AD Retrieved from
https://cymulate.com/blog/exploiting-pta-credential-
validation-in-azure-ad/
Microsoft. (2023a). Azure Active Directory pass-through
authentication security deep dive. Retrieved from
https://learn.microsoft.com/en-us/azure/active-
directory/hybrid/connect/how-to-connect-pta-security-
deep-dive
Microsoft. (2023b). Azure Active Directory Pass-through
Authentication: Quickstart. Retrieved from
https://learn.microsoft.com/en-us/azure/active-
directory/hybrid/connect/how-to-connect-pta-quick-
start
Microsoft. (2023c). How to: Use Data Protection. Retrieved
from https://learn.microsoft.com/en-us/dotnet/
standard/security/how-to-use-data-protection
Microsoft. (2023d). Process Monitor. Retrieved from
https://learn.microsoft.com/en-
us/sysinternals/downloads/procmon
Microsoft. (2023e). User sign-in with Microsoft Entra pass-
through authentication. Retrieved from https://learn.
microsoft.com/en-us/entra/fundamentals/whatis
Microsoft. (2024). What is Microsoft Entra ID? Retrieved
from https://learn.microsoft.com/en-us/entra/
fundamentals/whatis
OMG. (2011). Documents Associated with Business
Process Model and Notation (BPMN) Version 2.0.
Retrieved from http://www.omg.org/spec/BPMN/2.0/
Peffers, Ken, Tuunanen, Tuure, Rothenberger, Marcus A,
& Chatterjee, Samir. (2007). A Design Science
Research Methodology for Information Systems
Research. Journal of management information systems,
45-77.
Schneier, Bruce. (1999). Attack trees: modeling security
threats. Dr. Dobb's Journal, 24(12), 21,29. Retrieved
from https://www.drdobbs.com/attack-trees/
184411129
Secureworks. (2022). Azure Active Directory Pass-
Through Authentication Flaws. Retrieved from
https://www.secureworks.com/research/azure-active-
directory-pass-through-authentication-flaws
Syynimaa, Nestori. (2020a). AADInternals. PTAAgent.cs
sourcecode. Retrieved from https://github.com/
Gerenios/AADInternals/blob/073c9511b5d8d42795e2
6ccbab1d07e9c5cf95a6/PTAAgent.cs
Syynimaa, Nestori. (2020b). Deep-dive to Azure AD Pass-
Through Authentication. Retrieved from
https://aadinternals.com/post/pta-deepdive
Syynimaa, Nestori. (2021). PTASpy sourcecode. Retrieved
from https://github.com/Gerenios/public/blob/master/
PTASpy.cpp
Syynimaa, Nestori. (2022). Stealing and faking Azure AD
device identities. Retrieved from
https://aadinternals.com/post/deviceidentity/
Telerik. (2023). Fiddler Overview. Retrieved from
https://www.telerik.com/fiddler
Weiss, Jonathan D. (1991). A System Security Engineering
Process. Paper presented at the 14th National Computer
Security Conference (NIST/NCSC), Washington.