Next Article in Journal
Full X-Band Reconfigurable Linear-to-Circular Polarization Converter Based on a Continuous Meander-Line Staircase Metasurface
Previous Article in Journal
Deep Convolutional Neural Networks for Stress Detection: A Facial Emotion-Aware Approach
Previous Article in Special Issue
Explainable Logic-Driven Firewall Anomaly Detection with Knowledge Graph Visualization and Machine Learning Validation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Methodology for Quantitative Security Evaluation of Operating Systems: Scenario-Based Comparison of Qubes OS and Windows 11

AGH University of Krakow, Faculty of Computer Science, Electronics, and Telecommunications, Mickiewicza 30, 30-059 Krakow, Poland
*
Authors to whom correspondence should be addressed.
Electronics 2026, 15(10), 2110; https://doi.org/10.3390/electronics15102110
Submission received: 20 March 2026 / Revised: 4 May 2026 / Accepted: 11 May 2026 / Published: 14 May 2026

Abstract

Securing users’ endpoint devices is a highly important part of organizations’ overall security posture. The vast majority of cyber attacks either begin with endpoint compromise or use it as an effective method for lateral movement and privilege escalation. In this article we propose a new methodology for quantitatively assessing the overall security provided by operating systems, based on implemented mitigations of MITRE ATT&CK techniques. The proposed approach enables reproducible scenario-based comparisons of operating system security and can support security-oriented decision-making in organizational endpoint protection strategies. Moreover, it allows for quantitative assessment of operating systems under specific cyber attack scenarios, expressed as collections of adversaries’ utilized ATT&CK techniques, facilitating comparison across multiple operating systems under identical scenarios. We apply this methodology to Qubes OS and Windows 11, showcasing measurable differences in how both operating systems mitigate cyber threats.

1. Introduction

Cybersecurity is a broad field, from the security of user workstations and mobile devices (endpoint systems) through network and cloud security [1,2], to the protection of critical infrastructure and industrial control systems [3,4]. Due to the size and diversity of the field, it is difficult to conceptualize and catalog all the possible attacks on information technology (IT) systems and their mitigations. However, projects such as the MITRE ATT&CK framework attempt to create a comprehensive list of tactics, techniques, and procedures (TTPs) used by adversaries during cyber attacks  [5].
When reporting cyber attacks, many organizations make use of the MITRE ATT&CK framework to map each of the steps that an adversary has taken when performing the attack. The framework also provides a list of possible mitigations that can help defend against each step of an analyzed attack in the future. It is difficult, if not impossible, to implement all possible mitigations, but according to the report by Tidal Cyber and the Cyentia Institute [6], the most effective mitigations for the techniques observed and reported throughout the cyber threat landscape would be M1040, M1038, and M1028. These stand for Behavior Prevention on Endpoint, Execution Prevention, and Operating System Configuration, respectively [5]. All three relate partially or fully to the security of endpoint devices specifically. This underscores the still-inadequate state of endpoint security and showcases a need for more effective ways to protect users’ systems against diverse types of attacks.
Despite the widespread adoption of the MITRE ATT&CK framework for attack reporting and mitigation guidance, no established methodology exists for leveraging it to quantitatively compare the security postures of different operating systems. Given that the choice of operating system is one of the most fundamental decisions affecting endpoint security, this represents a gap worth addressing.
The purpose of this article is to propose and design a methodology for evaluating the security of a given operating system, based on the MITRE ATT&CK Enterprise framework. The proposed methodology allows for a quantitative description of an operating system’s resistance to specific tactics and techniques as well as providing a numerical basis for comparisons between different systems. This approach also allows researchers to calculate how well a chosen system would fare against a specific attack scenario, when broken down into steps based on MITRE ATT&CK.
The novelty of this approach lies in using MITRE ATT&CK technique mitigations as a quantitative scoring basis for cross-OS security comparison from the adversary’s perspective. Existing works in this area focus on risk assessment [7,8], organizational decision-making [9], vulnerability counts [10], or usability studies [11], but do not provide a reproducible framework for comparing how different operating systems mitigate documented attacker behavior at the endpoint level.
The article is organized into seven sections. Section 2 presents the current state of the art in the scientific and industry literature related to the security of operating systems and virtual machines. Next, Section 3 presents pertinent details about the security architectures of Qubes OS and Windows 11. Section 4 details the proposed quantitative security testing methodology and outlines two example security scenarios. Afterwards, Section 5 presents the results that were gathered using our methodology for Qubes OS and Windows 11. Section 6 discusses what can be inferred from the results, including a comparison between the effective security levels of the analyzed operating systems. Then, Section 7 presents our conclusions, including the limitations of the proposed methodology, as well as future research directions. Finally, Appendix A provides the complete data for both operating systems in tabular format.

2. Related Works

As far as the industry and scientific literature on the subject at hand is concerned, very few works address the topic of Qubes OS security specifically. We identified several works that tackle related subjects, such as methodologies utilizing MITRE ATT&CK to different ends and analyses of virtualization- and compartmentalization-based approaches to security.
Ahmed et al. [7] provided a comprehensive approach to assessing cybersecurity risks using the MITRE ATT&CK framework. Their method consists of organizational and threat modeling as well as assessing the probable impact of selected tactics and techniques. They utilized critical attack route simulations using attack scenarios from two APT groups, Lazarus and menuPass. Their approach finds certain similarities with our research, but focuses on overall risk assessments and not OS-level mitigations specifically.
Oruc, Amro and Gkioulos [8] proposed a new method of assessing cyber risks using the MITRE ATT&CK Enterprise and ICS frameworks. Their approach assigns each integrated navigation system component on a ship a set of related ATT&CK techniques. They then assign each combination a risk score from four categories, low, medium, high and critical, calculated based on the likelihood, impact and detectability of such a technique when applied to a component. Their resulting four-level categorization can be considered similar to the approach in our article, although the measured properties (risk vs. mitigation) present different approaches to utilizing the ATT&CK framework.
Mohamed, Hefny and Darwish [9] designed a cyber-defense approach that integrates the MITRE ATT&CK framework with multi-criteria decision-making methods. Through determining the relative importance of included techniques, they applied multi-criteria decision-making methods to create decision matrices that can be fine-tuned on a per-organization basis. Their approach allows organizations to utilize ATT&CK to prioritize the implementation of high-priority security controls to maximize gains in their cybersecurity posture.
Lefeuvre et al. [12] described the historical and contemporary landscape of compartmentalization, while providing recommendations and guidelines for approaching and implementing compartmentalized software systems. They demonstrated measurable security benefits stemming from such approaches, through an analysis of 61 systems and 211 research efforts in this field. While demonstrating that compartmentalized software can be a highly effective means of minimizing the impact of exploits, they also noted several obstacles to widespread adoption, such as the reliance on manual methods, maintenance burdens of legacy mechanisms, and non-standardized abstractions.
Issa, Murray, and Ernst described the usability of the user interfaces of converged multi-level secure (MLS) systems [11]. They observed the behavior of 21 participants using the Cross Domain Desktop Compositor (CDDC) and judged, through a series of tests, whether the users would behave securely, maintaining correct isolation between security domains throughout the duration of the experiment. Their findings indicate that such a method of compartmentalization shows significant promise for security-critical tasks, as most (19 out of 21) participants managed to succeed in behaving securely, even under more demanding scenarios. This result is of special importance for laying out the assumptions of this research, as the CDDC’s design bears a resemblance to that of Qubes OS and it is likely that it was inspired by it, considering that its patent application was filed five years after the first alpha release of Qubes OS [13]. This lets us assume that basic security measures will be followed by users using Qubes OS, who will not immediately break its security model through user error.
Sharma and Khilji presented a method for evaluating an element of the security of Qubes OS based on the number of reported and fixed security vulnerabilities in the Fedora project [10]. This represents an alternative approach to estimating the security of an operating system. Although the method we implement differs from this one, it is nonetheless a useful approach that could be used to examine the security of an operating system more holistically.
Singh and Somani proposed a taxonomy of cross-virtual machine attacks and possible defense mechanisms [14]. They separated cross-VM attacks into five categories, each requiring different conditions and presenting unique challenges for VM security. Certain types of the described attacks are already accounted for by Qubes OS’s or Xen’s built-in security mechanisms, but this taxonomy is nonetheless useful regardless of the utilized hypervisor and distribution.
Motiee et al. conducted a study of whether Windows users followed the principle of least privilege in relation to Windows’s User Account Control (UAC) [15]. Their findings demonstrate that, depending on interpretation methods, 69–94% of users did not follow the principle successfully and consented to fake/malicious prompts, demonstrating that Windows’s UAC prompt can be thought of as click-through in most cases.
Tidal Cyber and the Cyentia Institute recently performed an in-depth meta-analysis of the most common attack techniques based on MITRE ATT&CK classification [6]. It is a very helpful source of quantitative data and has served multiple purposes in this research.
It is worth mentioning that current events [16] have triggered renewed interest in digital sovereignty across European nations [17], such as Denmark [18] and Germany [19,20]. Qubes OS, as a free and open-source (FOSS) project [21], could be an effective tool to achieve such goals, while increasing the security of organizations. In particular, this is not just the realm of theory, as organizations such as The Guardian [22] and Freedom of the Press Foundation [23] have already deployed Qubes OS for security-critical workloads and there do exist standards compatible with ISO-27001 that include dedicated compliance controls for this operating system [24].
To the best of our knowledge, no peer-reviewed work to date applies MITRE ATT&CK technique mitigations as a quantitative basis for comparing the security postures of different desktop operating systems. The works presented above either focus on risk assessment, organizational decision-making, or vulnerability counting, but do not provide a reproducible framework for cross-OS security comparison at the endpoint level. This is the gap that the present article aims to address.

3. Security Architectures of Operating Systems

Desktop operating systems are continuously increasing in complexity and new security measures are constantly being implemented to combat known and emerging threats. This section presents the main security features of two operating systems selected to validate the proposed methodology in practice: Qubes OS and Windows 11.

3.1. Qubes OS Security Architecture

Qubes OS is a free and open-source (FOSS) desktop operating system designed with security at its core. It relies on virtualization provided by the Xen project in order to create and manage virtual machines (VMs), called qubes [25,26]. By default, Qubes OS provides GNU/Linux-based guest operating systems (Fedora, Debian, and Whonix) for usage in the userspace. The management domain (virtual machine), called dom0, runs Fedora Linux, and users are free to choose any other operating system for the user domains. The project also supports (either officially or through community efforts) the running of other GNU/Linux-based operating systems, with Windows 10/11 integration through Qubes Windows Tools [27], as well as community support for the Mirage unikernel OS [28].
The Qubes OS security architecture expects users to create separate qubes for separate trust levels, such as separating casual Internet browsing from e-mail, password management, or work-related activities. The OS creates a collection of such virtual machines by default during installation, but the user is free to change this configuration as needed. Qubes OS also creates the sys-usb, sys-net and sys-firewall virtual machines by default in order to separate out the USB and networking stacks to protect from various kinds of vulnerabilities and attacks. Figure 1 presents the typical configuration of virtual machines on a Qubes system. (The exception is the GuiVM/AdminVM separation. As of Qubes 4.3, these are by default integrated as one virtual machine—dom0. It is possible to opt in to GuiVM/AdminVM separation after installation.) On a live Qubes OS installation, each virtual machine displays its windows on the unified desktop and is marked with colored window borders, allowing users to easily tell which trust level each window belongs to.
In order to provide additional security and usability and decrease disk usage, Qubes OS makes use of the template system. Templates are clean installations of OS distributions that provide their root file system to other qubes, called AppVMs [29]. Figure 2 illustrates this process. In essence, each AppVM has its own private storage, which is persistent across reboots but shares the same root image, changes to which are not saved when the AppVM is shut down. This allows users to install software and perform other system modifications in a single qube (the TemplateVM for a number of AppVMs), with the modifications propagating to all derived AppVMs after a reboot [29].
This provides numerous advantages, including, but not limited to, the following.
  • Security. Using the template system makes it significantly easier to apply system updates to many virtual machines at once. AppVMs also do not have write access to the templates’ original root images, which means that any malware infections occurring in an AppVM should be contained to just that qube.
  • Performance. Using a common root file system and initially empty private images allows for very rapid creation of new AppVMs.
  • Storage. Having just one root file system per template significantly cuts down on the storage requirements of running a large number of virtual machines.
In addition to TemplateVMs and AppVMs, Qubes OS also provides two additional types of virtual machines. They are: DisposableVMs and StandaloneVMs. The former work similarly to AppVMs, with a root file system based on a TemplateVM, but their private image is also cleared upon shutdown. This makes them ideal for riskier actions, such as opening untrusted files or URLs, as malware should not have the opportunity to achieve any persistence without significant user interaction [31]. StandaloneVMs are the opposite—they are not template-derived (unless cloned from one) and have full persistence for all of their file systems. This makes them useful for certain development tasks and for usage as typical virtual machines [32].
Qubes OS includes additional security measures such as USB and RPC policies, full-disk encryption (FDE) and many others, but providing an exhaustive list of the implemented measures is outside of the scope of this article. When evaluating the security mitigations and scenarios in Section 4 and Section 5, any measures that may affect the results will be mentioned. Security features inherited from Fedora Linux (the default AppVM template in Qubes) will also be considered.

3.2. Windows 11 Security Architecture

Although Windows is a very popular desktop and moderately popular server operating system, Windows 11 specifically introduced several new security features that are worth highlighting. This section presents some of the newer and less commonly known security features introduced by Microsoft for this major release of Windows. Most of the information contained in this section is based on the Windows 11 Security Book [33].
One of the most immediately evident features that differentiates Windows 11 from Windows 10 is its requirement for the presence of a Trusted Platform Module (TPM) 2.0 chip in the hardware of the host device [33] (p. 8). Windows 11 utilizes the TPM device as a hardware root of trust to provide security features such as Trusted Boot, Windows Hello, BitLocker, System Guard, Measured Boot and Microsoft Azure Remote Attestation [33] (pp. 8, 18, 22, 44, 64).
Windows 11 devices come with UEFI Secure Boot enabled as a “baseline security feature of all Windows 11 PCs” [33] (p. 12). This, combined with the TPM-provided root of trust and Measured Boot, is called Trusted Boot and is enabled by default on Windows 11 devices, impeding the capabilities of rootkits and similar types of malware [33] (p. 15).
On hardware with an IOMMU, Windows 11 enables Kernel Direct Memory Access (DMA) Protection by default. This increases the level of protection against drive-by DMA attacks through Thunderbolt/USB4 DMA to kernel memory. It is worth mentioning that, contrary to Microsoft’s claims in the Security Book, this only protects against specifically the DMA attack class, not arbitrary types of “physical attack wherever people work” [33] (p. 11).
Windows 11 also introduces several security features based on virtualization. These are as follows.
  • Virtualization-based security (VBS) utilizes hardware virtualization features to create an isolated environment for hosting certain security-critical features and lays the groundwork for other features based on itself.
  • Hypervisor-Protected Code Integrity (HVCI) is based on VBS and runs Kernel Mode Code Integrity (KMCI) isolated in the containment of VBS to reduce the likelihood of attacks on kernel-mode code.
  • Local Security Authority (LSA) Protection, also called RunAsProcessProtectedLight (RunAsPPL), utilizes VBS to protect the Local Security Authority Subsystem Service (LSASS) from certain types of attacks, such as process injection.
  • Credential Guard uses VBS to protect Active Directory (AD) credentials from attacks such as Pass-the-Hash or Pass-the-Ticket [33] (pp. 10, 51).
The first three security features are enabled by default for clean Windows 11 installs, while Credential Guard requires Windows Enterprise or Windows Education licenses [34].
Windows 11 also includes several enabled-by-default features related to exploit mitigations. These are: Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), and Control Flow Guard (CFG). DEP marks certain memory pages as non-executable, helping prevent exploits from running code from the heap, stack, and memory pools. ASLR randomizes the memory addresses where programs get loaded for images that opted in at compile time. CFG performs additional runtime checks on indirect function call targets and helps protect against memory corruption vulnerabilities [35].
Microsoft has also continuously expanded its Microsoft Defender Antivirus and other default app protection solutions with additional functionality. Worth mentioning are: Tamper Protection, which protects Microsoft Defender components from unauthorized modification [33] (p. 32); Smart App Control (SAC), enabled by default on clean Windows 11 installs, which leverages cloud-based intelligence to predict whether apps are safe to run [33] (pp. 37, 38); and the Vulnerable Driver Blocklist (VDB), which utilizes a seldom-updated blacklist to restrict loading vulnerable drivers to help protect against attacks on the NT kernel [33] (p. 39). Windows 11 also enables App-Bound Encryption (ABE) by default for select apps (such as Microsoft Edge). This aims to make it more difficult for attackers to extract cookies and saved credentials from applications such as web browsers, but bypasses are documented, with forensics companies offering such services as part of their tooling [36]. Microsoft is also developing a new feature called Enhanced Phishing Protection (EPP), but as of yet it only operates in audit mode by default [33] (p. 50).
On the authentication control layer, Microsoft has added Server Message Block (SMB) signing as a requirement, which protects against tampering and replay attacks targeting SMB packets [33] (p. 28). Windows 11 also adds a default account lock-out policy for new devices (10-minute delay after 10 failed login attempts) to protect against brute-force attacks on local and Remote Desktop (RD) accounts [33] (p. 53). As with previous Windows versions, Windows 11 also includes User Account Control (UAC) as an elevation control mechanism, but bypass mechanisms are “regularly discovered and […] used in the wild” [37] as well as being considered effectively click-through for most use-cases [15].

3.3. Architectural Comparison

The two operating systems represent fundamentally different approaches to endpoint security. Qubes OS relies on hardware-enforced isolation through the Xen hypervisor, compartmentalizing user activities into separate virtual machines with minimal trust between domains. Its security model assumes that individual compartments may be compromised and focuses on limiting the blast radius of such events. Windows 11, by contrast, operates within a monolithic kernel environment and employs a layered defense strategy combining detection-based controls (Microsoft Defender and Smart App Control), exploit mitigations (DEP, ASLR, and CFG), and virtualization-based security for select sensitive components such as Credential Guard. Its model primarily aims to prevent compromise within a single shared environment. This architectural contrast makes the pairing particularly informative for evaluating the proposed methodology across systems with distinct security philosophies.

4. Methodology

The study’s methodology consisted of two parts. Firstly, we created a table with MITRE ATT&CK v18 tactics and techniques (TTs), scoring and describing what kinds of mitigations each operating system had in relation to those TTs. Secondly, to showcase the methodology’s applicability to cyber attack scenario-based analyses, two suitable attack campaigns were chosen and analyzed using the created TT mitigation scoring table.
MITRE ATT&CK was chosen as the foundation for this methodology because its mitigation dimension helps to assess OS security from the adversary’s perspective, which ATT&CK is uniquely suited for due to its comprehensive coverage of real-world TTPs, not merely cataloging which techniques apply to a given platform. Importantly, the methodology scores the quality and completeness of each OS’s mitigations, meaning that a technique applicable to both systems but well-mitigated by only one will be reflected in the results. CVE-based approaches were considered but tend to reflect vulnerability discovery rates rather than architectural security posture [10]. Complementary frameworks such as MITRE D3FEND could enrich future iterations and are discussed in Section 7.2.
For the purposes of the study, two operating systems representing contrasting architectural approaches to endpoint security were selected: Qubes OS r4.3.0 [38] and Windows 11 24H2 [39]. This pairing serves as a test of the methodology’s applicability across architecturally distinct systems. Qubes OS was chosen for this study as it is often highly acclaimed by cybersecurity experts [40]. For comparison with a commonly used operating system, Windows 11 was chosen due to its significant adoption by end users, being the second most widely used operating system worldwide after Android [41], dedicated to mobile devices.

4.1. Mitigations

The tactics and techniques analyzed in this study were compiled by filtering the entirety of the MITRE ATT&CK Enterprise Matrix [5] for TTs affecting both the Linux and Windows platforms. Techniques specific only to one platform and not the other (such as Windows Background Intelligent Transfer Service jobs, T1197) were removed. Tactics not specifically related to OS security, that is TA0043: Reconnaissance and TA0042: Resource Development, were removed as out of scope. Additionally, tactics TA0002, TA0008, TA0011 and TA0010 were excluded. The rationale for the exclusion of those tactics is as follows. TA0002: Execution was excluded as a large part of its techniques target non-endpoint environments (ESXi, containers, cloud and serverless) and the remaining techniques largely describe abuse of legitimate OS functionality, mitigation of which is usually the domain of dedicated Endpoint Detection and Response (EDR) solutions and not OSs themselves. Additionally, compartmentalization-based effects on execution containment are partially captured by the analysis of techniques in Privilege Escalation and Defense Evasion. TA0008: Lateral Movement was removed, as most of the techniques therein concern themselves with movement between separate networked systems with significant reliance on OS-specific sub-techniques, which were difficult to reconcile between the selected OSs. TA0011: Command and Control encompasses techniques related to Command and Control (C2) communication. Most of its related techniques, such as Data Obfuscation, Data Encoding and Application Layer Protocol, do not find an application to endpoint OS security specifically. A similar approach was used when excluding TA0010: Exfiltration, as most of its techniques, for example Exfiltration Over Alternative Protocol, are not in scope for OS-level mitigations, being more the domain of Intrusion Detection/Prevention (IDPS) and Data Loss Prevention (DLP) systems.
Finally, techniques affecting external, non-endpoint systems (such as T1190: Exploit Public-Facing Application) were left out as well. As a result, the comparison focuses strictly on endpoint-resident OS-level mitigations and does not capture network-layer defenses. This reduces confounding factors outside the OS’s direct control, at the cost of a narrower scope. For each of the selected techniques, the following tasks were performed.
  • The MITRE technique definition was consulted from the official MITRE website, including sub-techniques, procedure examples, mitigations, and detection strategies.
  • Official documentation sources, technical reports, and scientific articles were consulted in order to describe the details of how an operating system mitigates the specified technique.
  • If such sources proved inadequate, practical attack simulations utilizing specific tactics were performed on live installations of the chosen operating systems.
  • Based on the information gathered, a mitigation score and the corresponding description were assigned to the technique for each of the operating systems.
Mitigation details and scores were written and calculated with the following assumptions.
  • It was assumed that the user is using Qubes OS correctly (for example separating work, email, and miscellaneous browsing into appropriate AppVMs), but overall they use the default configuration (meaning only sys-usb and sys-firewall were configured as disposable; the user does everything else in AppVMs). (AppVMs are virtual machines that, in short, have an ephemeral root file system taken from a TemplateVM and a persistent /home directory. Disposable VMs have all of their block storage devices configured as ephemeral.) We believe that this assumption is reasonable on the basis of the research findings of Issa et al. [11], discussed in Section 2.
  • Mitigation scores were defined so that Low represents next to no mitigation or measures that are trivially easy to bypass. Medium represents reasonable mitigation efforts that may still be bypassable under certain circumstances or complete mitigation via domain isolation but without specific in-domain mechanisms. High is taken to mean complete or near-complete mitigation that would be difficult to circumvent without significant user interaction.
  • Critically, it was assumed that threat actors are sophisticated and are able to bypass standard detection-based security measures (such as through the use of polymorphic malware and indirect execution), but do not use zero-day exploits.
To illustrate the scoring process in practice, Appendix B presents worked examples for three representative techniques.

Mitigation Score Calculation

The mitigation scores were then converted into numerical values, with Low assigned a value of 0 points, Medium assigned a value of 1 point, and High assigned a value of 2 points. This means that within one ATT&CK tactic, successful and complete mitigation (with a score of High) of all of the tactic’s techniques would grant an operating system a score of 2 × n , where n denotes the total number of techniques within the tactic. A complete lack of mitigations would result in a score of 0.
The findings of this research were compiled into a table and used to calculate interesting quantitative indicators in the form of charts and totals tables. Section 5 focuses on that information, as well as the analysis of chosen security scenarios based on synthesized mitigation data. It is worth mentioning that the careful selection of the aforementioned assumptions is important, as they are bound to have a moderate to notable impact on the overall results. This is further elaborated on in Section 7.1.

4.2. Scenarios

In order to be compatible with the presented methodology, security scenarios must be defined in relation to MITRE ATT&CK TTs, as this is the industry-standard method of decomposing a complex attack scenario into its component parts. For the purposes of this work, two comprehensive scenarios were chosen to demonstrate what the application of this methodology to security incident scenarios would entail.
The first selected scenario concerned the 2019–present Conti ransomware campaign, carried out by the Russian Wizard Spider hacking group. The attack has been carried out on a large scale, with the primary targets being North American government agencies and corporations. In this attack’s lifecycle, the ransomware is usually distributed via spear phishing and stolen credentials. After execution, the malware escalates privileges through process injection and performs discovery through the abuse of legitimate system functionality, such as using system APIs to discover processes, remote systems and network shares. It then moves laterally by accessing saved credentials, exploiting Kerberos and SMB, and impairs defenses by stopping security and backup-related services. Finally, the malware exfiltrates sensitive data and encrypts the user’s local copy, demanding a ransom for decryption and threatening targets with public release of their data if they do not comply. Full information about the attack, including an extended set of utilized tactics and techniques, can be found on the CISA Alerts page [42] and Conti’s dedicated page in the MITRE ATT&CK’s Software catalog [43].
Figure 3 presents a chart made in the MITRE ATT&CK Navigator [44] that showcases the TTPs used in the Conti ransomware campaign as reported by MITRE [43], along with utilized sub-techniques. The annotations in parentheses are generated by the Navigator and denote the number of highlighted sub-techniques out of the total available for a given technique. The layer presents the full campaign as documented by MITRE, including tactics outside the scope of this study’s analysis (TA0002: Execution and TA0008: Lateral Movement), in order to provide a complete picture of the attack chain. Only the techniques falling within the tactics defined in Section 4.1 were used for the scoring analysis presented in Section 5.
The second scenario concerns the high-profile SolarWinds compromise, also carried out by a Russian actor, APT29, codenamed Iron Ritual. It resulted in the compromise of the SolarWinds Orion software suite, giving APT29 access to government and corporate organizations across North America, Europe, Asia and the Middle East. The campaign was carried out through a supply chain attack using a compromised software update that allowed attackers to execute arbitrary code in victims’ environments and gain persistence through scheduled tasks. The attackers then used a wide range of techniques, such as stealing account credentials and password spraying, to elevate privileges and move laterally. Similarly to Conti, the malware also disabled various services related to security and monitoring. The ultimate goals of the attacks on each target were varied, and some are not known to date. Most attacks were aimed at gaining a foothold in the infrastructure and exfiltrating confidential data, sometimes using the compromised organizations’ systems to move on to higher-value targets, such as government agencies. Information about this campaign has been taken from MITRE ATT&CK’s comprehensive documentation in its Campaigns catalog [45].
The analysis of per-OS mitigations of the aforementioned scenarios was performed using the mitigations table created according to the process described in Section 4.1. For each of the scenarios analyzed, the table was filtered to include only the tactics and techniques utilized by each of the campaigns, as detailed on their CISA [42] and MITRE [43,45] pages. The per-tactic mitigation percentages were then calculated in a manner analogous to the main table, by tallying up the mitigation scores for each tactic’s techniques and dividing them by the maximum achievable score.

5. Results

This section presents the processed results of determining the mitigation degrees of MITRE ATT&CK tactics, as chosen in Section 4. It also presents example applications of this methodology to attack scenarios selected in Section 4. The complete unprocessed results and raw data are presented in Appendix A.

5.1. Mitigations

Figure 4 presents overall mitigation results, with the y-axis representing the percentage of maximum mitigation achieved per tactic by each operating system. While Qubes OS came out ahead in every tactic, the difference between operating systems’ mitigation percentages varied considerably. In general, the conducted research has found that Qubes OS’s security mitigations outperformed Windows 11’s across all analyzed MITRE ATT&CK tactics.
The tactic where Qubes OS achieved the highest mitigation percentage of 80% was TA0006: Credential Access, while the one where Windows 11 scored the highest with 43% successful mitigation was TA0005: Defense Evasion. The lowest scores were also observed within different domains, with Qubes OS scoring its lowest mitigation percentage of 58% in TA0040: Impact and Windows 11 scoring the lowest mitigation score of just 5% in TA0007: Discovery.
In terms of intra-tactic differences, the analyzed operating systems differed greatly, as can be seen in Figure 5. Qubes OS’s lead over Windows 11 is seen most strongly in the TA0007: Discovery and TA0009: Collection tactics, with 59 and 61 pp, respectively. The difference between the two operating systems turned out to be the lowest for TA0003: Persistence and TA0004: Privilege Escalation, with a 35 pp difference for the former and 27 pp for the latter. These differences are discussed in detail in Section 5.
Table 1 presents the totals and summary statistics for all analyzed MITRE ATT&CK tactics. Throughout the space, Qubes OS managed to achieve a mitigation score of 64%, which is more than 2.5 times higher than Windows 11’s score. As mentioned before, Qubes OS’s minimum score is still noticeably higher than Windows 11’s maximum, showcasing no overlap between the two operating systems’ score distributions. A similar median and mean points to Qubes OS’s distribution being more symmetric, while Windows’s distribution is left-skewed due to very weak tactics dragging the average down. Despite having a lower mean ( μ ), Windows’s standard deviation ( σ ) is twice as large as Qubes’s. This, along with a more than five-times-larger coefficient of variation (CV) points to Windows’s protections being more “hit or miss” than consistent, while Qubes’s protections are more consistent.
The denominator of 222 represents the maximum achievable score, calculated as 2 × n summed across all analyzed tactics, where n is the number of techniques per tactic and 2 corresponds to the highest mitigation score (High).

5.2. Scenarios

The results of the Conti ransomware campaign attack scenario analysis are shown in Figure 6. In general, a rough approximation of the distribution shape in Figure 4 can be seen, with a local maximum in TA0003: Persistence becoming a global one, and Qubes OS once again scoring visibly higher than Windows 11 in TA0007: Discovery.
In the case of this tactic, Qubes OS achieved a mitigation percentage of 50%, while Windows 11 offered no mitigation whatsoever. In the specific case of the Conti ransomware campaign scenario, mitigation scores for Qubes OS and Windows 11 differ less than in the general case, even reaching identical mitigation percentages for three of the tactics.
A similar situation can be seen in the mitigation results for the Solar Winds campaign presented in Figure 7—Qubes OS managed to achieve measurably better mitigation percentages than Windows 11, while this time scoring similarly in one tactic, TA0005: Defense Evasion. Once again, Qubes OS also managed to achieve satisfactory mitigation percentage scores for tactics in which Windows 11 did not manage to mitigate anything effectively: TA0007: Discovery and TA0009: Collection.
The examples presented illustrate the practical applicability of the proposed security research methodology to scenario-based evaluations. It is worth noting that for scenarios with a good break-down into sub-techniques and procedures it would be worthwhile to extend the mitigations table with even more granular scores to help increase the accuracy and applicability of our proposed methodology.

6. Discussion

The results presented in Section 5 suggest that the security-by-isolation model introduced by Qubes OS has measurable advantages over a more traditional approach presented by Windows 11. In particular, the fact that Qubes OS’s lowest tactic mitigation score (58%) was still found to be higher than Windows 11’s highest (43%) may indicate an advantage caused by architecture-level considerations, not single-tactic outliers. This is confirmed by Qubes OS’s significantly lower coefficient of variation of 10% compared to Windows’s 52%. In attack scenarios that rely on multiple stages and dozens of techniques, such stable coverage can turn out to be critical for preventing a breach.
Qubes OS’s highest score in Credential Access suggests that isolating workflows into separate security domains can significantly reduce attack pathways to credential exposure. Windows’s best performance in Defense Evasion aligns with Microsoft’s recent investment in platform security features such as virtualization-based protections [33].
The large difference between Windows’s and Qubes OS’s mitigation scores in Discovery and Collection point to the inherent difficulty of effectively mitigating attacks based on abusing legitimate system functionality. An application running locally on a Windows system faces few to no obstacles to calling system APIs that allow it to discover system information—a majority of the techniques from TA0007: Discovery do not generate permission prompts, nor do most of them require elevated privileges. An isolation-based approach may be one of the more effective ways to mitigate this, as a stream of permission pop-ups from software asking for access to system APIs might quickly cause such dialogs to lose relevance, for example with User Account Control dialog boxes on Windows [15]. It is worth mentioning that certain elements of Windows’s Discovery and Collection mitigation scoring would likely change if a deployed EDR solution’s behavioral anomaly detection engine were to be taken into account. Such a solution may or may not flag and block assumed usage of certain adversarial techniques, such as T1010: Application Window Discovery or T1057: Process Discovery. In such a situation, the mitigation scoring table and graphs would exhibit visible differences. Their current contents are based on the assumptions previously detailed in Section 4.1.
It is worth noting that the results presented above treat all analyzed techniques equally. As discussed in Section 7.2, integrating technique weighting based on real-world prevalence data or organization-specific threat models could shift the relative standings, particularly for tactics where one operating system dominates a small number of high-impact techniques.
There is one area in which Windows 11’s protections proved consistently more mature than ones implemented by default on Qubes OS. Windows 11 leads in techniques such as T1542: Pre-OS Boot, where Secure Boot being enabled by default provides protections that are absent on the Qubes OS side. It is of course possible for users to enroll their own Secure Boot keys for Qubes and even implement advanced features like Measured Boot with Heads [46], but this is not the default configuration as of the time of writing. For even greater security, certain Qubes-certified hardware offers Dasharo TrustRoot (Intel Boot Guard) [47], but this configuration is inherently dependent on availability of both firmware and hardware support.
All of the above showcases that our proposed methodology is applicable across operating systems with notably different architectures and could be extended to an even broader variety of such systems. Through a well-known scaffolding in the MITRE ATT&CK framework, the methodology also lends itself to independent verification of results and community contribution models—perhaps in the form of a continuously updated database covering a range of commonly used operating systems that would allow for the simultaneous reduction in duplication of effort and discussion among researchers and security professionals.

7. Conclusions

Throughout this article, a new methodology for quantitatively evaluating the security of operating systems has been put forward, together with an example of how to apply such a methodology to scenario-based analyses. The methodology has been applied to compare the security mitigation levels of Qubes OS and Windows 11. Our findings indicate that Qubes OS’s architectural security-through-isolation approach provides measurable benefits to the security of endpoint devices. Qubes OS achieves higher overall mitigation percentages in all ATT&CK tactics, while conceding ground to Windows 11 in a select few techniques, mostly related to Secure Boot. To the best of our knowledge, this represents the first reproducible framework for comparing OS security postures at the endpoint level using ATT&CK technique mitigations from the adversary’s perspective.

7.1. Limitations

It is worth reiterating that the proposed methodology is quite sensitive to initial assumptions. For example, performing this analysis with an assumed unsophisticated adversary would likely change the results, as:
(1)
Operating systems that rely on detective security measures to a significant degree, such as Windows 11, would be able to successfully block many more classes of attacks.
(2)
Unsophisticated adversaries are less likely to write malware targeting GNU/Linux-based desktop operating systems.
Additionally, while the three-point scale (Low, Medium and High) used in this work lends itself to easier understanding and helps perform analyses for larger numbers of ATT&CK techniques, expanding it to, for example, a five-point scale could give more fidelity. Such an approach could also be beneficial in the context of boundary conditions—a researcher’s decision to put an “on the edge” component into the Medium or High class can have a notable statistical impact that would be lowered by increasing the number of points on the overall scale. Additionally, involving multiple independent raters in the scoring process and performing inter-rater reliability analysis could help quantify the degree of subjectivity inherent in the current approach.
It is also worth noting that while practical attack simulations were performed on live installations where documentation proved inadequate, a significant majority of mitigation scores were assigned based on official documentation, technical reports, and scientific articles. Systematic penetration testing or controlled malware trials across all analyzed techniques would further strengthen the validity of the assigned scores, although the scale of such an undertaking would be considerable given the number of techniques evaluated.
Furthermore, the analysis presented in this article is based on default, clean-install configurations for both operating systems. Windows 11’s mitigation scores would likely improve under enterprise-grade hardening, such as enabling Credential Guard, Attack Surface Reduction (ASR) rules, or stricter Microsoft Defender policies. Similarly, Qubes OS results could shift with more aggressive compartmentalization strategies, such as the exclusive use of DisposableVMs, or conversely decrease with less disciplined usage patterns. Quantifying this configuration sensitivity is an avenue for future research, as noted in Section 7.2.
Finally, both the MITRE ATT&CK framework and the operating systems themselves evolve constantly and rapidly. This means that future research using this methodology may encounter certain difficulties comparing its results with the findings of its predecessors if a long period of time has elapsed. This, unfortunately, seems to be unavoidable in such a fast-paced industry as IT, although we believe that grounding the methodology in a well-established industry standard helps to future-proof it somewhat.

7.2. Future Directions

Future research can easily expand on the body of knowledge by utilizing our proposed methodology in at least three ways. First, additional operating systems can be introduced into the comparison in order to see which ones perform the best under identical assumptions. Second, the assumptions can be changed, offering insight into how the analyzed operating systems deal with differing levels of adversary sophistication or usage patterns. Third, comparisons could be performed between different configurations of the same operating system, for example to provide an indication of how an OS’s security has changed over the course of many versions or to investigate the effectiveness of certain hardening methods.
Additionally, integrating complementary frameworks such as MITRE D3FEND into the methodology could provide a more structured way of mapping the defensive techniques employed by each operating system to the ATT&CK techniques they counter.
Furthermore, integrating technique weighting based on real-world prevalence data, such as that provided by Tidal Cyber and the Cyentia Institute [6], or multi-criteria decision-making approaches, such as those proposed by Mohamed et al. [9] and Ahmed et al. [7], could allow the methodology to reflect the relative importance of individual techniques rather than treating them equally. Such weighting could also be fine-tuned on a per-organization basis to better reflect specific threat models and operational contexts.
Lastly, the analysis presented in this article deals with MITRE ATT&CK tactics and techniques. It would be possible to conduct a more in-depth analysis that also takes into account specific sub-techniques and procedures. Although the authors believe that such an approach would be useful, the ratio of the amount of effort required compared to the outcome would quite possibly be higher than in the case of analyzing just the tactics and techniques. Nevertheless, this remains a worthwhile avenue for future research.

Author Contributions

Conceptualization, A.K. and M.N.; methodology, A.K. and M.N.; software, A.K.; validation, A.K. and M.N.; formal analysis, A.K.; investigation, A.K.; resources, A.K.; data curation, A.K.; writing—original draft preparation, A.K.; writing—review and editing, A.K. and M.N.; visualization, A.K.; supervision, M.N.; project administration, M.N.; funding acquisition, M.N. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ABEApp-Bound Encryption
ADActive Directory
APIApplication Programming Interface
APTAdvanced Persistent Threat
ASLRAddress Space Layout Randomization
ATT&CKAdversarial Tactics, Techniques, and Common Knowledge
BYOVDBring Your Own Vulnerable Driver
C2Command and Control
CDDC     Cross Domain Desktop Compositor
CFGControl Flow Guard
CGCredential Guard
CISACybersecurity and Infrastructure Security Agency
CVCoefficient of Variation
DEPData Execution Prevention
DLLDynamic-Link Library
DLPData Loss Prevention
DMADirect Memory Access
DPAPIData Protection Application Programming Interface
EDREndpoint Detection and Response
EPPEnhanced Phishing Protection
ESSEnhanced Sign-in Security
FDEFull-Disk Encryption
FOSSFree and Open-Source Software
GNUGnu’s not Unix
GUIGraphical User Interface
HKLMHKEY_LOCAL_MACHINE
HVCIHypervisor-Protected Code Integrity
HfBHello for Business
IDPSIntrusion Detection/Prevention System
IOMMUInput–Output Memory Management Unit
ISOInternational Organization for Standardization
LNKLink (Windows Shortcut)
LSALocal Security Authority
LSASSLocal Security Authority Subsystem Service
MLSMulti-Level Secure
OSOperating System
PAMPluggable Authentication Modules
PCPersonal Computer
PPLProtected Process Light
RDRemote Desktop
RPCRemote Procedure Call
SACSmart App Control
SCMService Control Manager
SDSMSoftware-Defined Secure Memory
SMBServer Message Block
TPMTrusted Platform Module
TTTactics and Techniques
TTPsTactics, Techniques and Procedures
UACUser Account Control
UEFIUnified Extensible Firmware Interface
URLUniform Resource Locator
USBUniversal Serial Bus
VBSVirtualization-Based Security
VMVirtual Machine
VSSVolume Shadow Copy Service
WRPWindows Resource Protection
WinREWindows Recovery Environment

Appendix A. MITRE ATT&CK Technique Mitigation Comparison Table

TacticTech. IDTechnique NameQubes OSQubes OS Mitigation DetailsWin. 11Windows 11 Mitigation Details
TA0001:
Initial Access
T1659Content InjectionMediumImpact localized to single VMLowNo specific protections assuming signature-based detection is bypassed
T1189Drive-by CompromiseMediumImpact localized to single VMLowNo specific protections assuming signature-based detection is bypassed. DEP, ASLR, CFG assumed bypassable
T1133External Remote ServicesHighRemote access disabled by default. If enabled, would be contained to one VMHighRemote access disabled by default
T1200Hardware AdditionsMediumUSB, Thunderbolt protection provided via IOMMU/VT-d and USB isolation, but no Secure Boot support by defaultMediumSecure Boot by default, but no USB isolation
T1566PhishingMediumImpact localized to single VMLowNo specific protections assuming signature-based detection is bypassed
T1091Replication Through Removable MediaMediumRemovable media contained to sys-usb by default. Can still infect VMs media is passed through toLowNo specific protections assuming signature-based detection is bypassed
T1195Supply Chain CompromiseMediumTemplate VM compromise affects a sizeable chunk of the system, but dom0 utilizes separate package sources and multiple templates reduce overall impactLowSupply chain compromise means whole-OS compromise
T1199Trusted RelationshipHighNo trusted relationships by default. Otherwise localized to single VM/VM groupHighNo trusted relationships with outsize systems by default
T1078Valid AccountsMediumImpact localized to single VM. Valid user account = valid root account for one VMMediumMicrosoft Account set up by default. No default local admin credentials
T1669Wi-Fi NetworksHighNetwork driver compromise made not very effective via IOMMU isolation to sys-net. Separate firewall qubeMediumMost attempts blocked by firewall. Network driver compromise is fatal
Total 13/20 7/20
Perc. 65.0% 35.0%
TA0003:
Persistence
T1098Account ManipulationHighAccounts are not persistent across AppVM rebootsMediumLSA PPL protects credential storage partially. Microsoft Account modification needs additional credentials
T1547Boot or Logon Autostart ExecutionMediumImpact localized to single VM. Many vectors closed off by root non-persistenceLowAbuse of legitimate system feature
T1037Boot or Logon Initialization ScriptsMediumImpact localized to single VM. Many vectors closed off by root non-persistenceLowAbuse of legitimate system feature
T1554Compromise Host Software BinaryMediumImpact localized to single VM. Many vectors closed off by root non-persistenceMediumWindows Resource Protection enabled by default
T1136Create AccountHighAccounts are not persistent across AppVM rebootsLowUAC is click-through for most users
T1543Create or Modify System ProcessMediumImpact localized to single VMMediumSCM permissions protect, requires UAC prompt, PPL can help
T1546Event-Triggered ExecutionMediumImpact localized to single VM. Many vectors closed off by root non-persistence.LowAbuse of legitimate system feature
T1668Exclusive ControlMediumPatching is done via TemplateVMs exclusively by defaultLowAbuse of legitimate system feature
T1133External Remote ServicesHighRemote access disabled by default. If enabled, would be contained to one VMHighRemote access disabled by default
T1574Hijack Execution FlowMediumImpact localized to single VMMediumCertain mechanisms (SDSM, WRP, KnownDLLs) exist, but user applications are easily bypassable. Abuse of legitimate system feature
T1556Modify Authentication ProcessHighNo real authentication process to modify in AppVMs, cannot modify dom0 authentication from within VMMediumLSA PPL enabled by default, requires UAC
T1653Power SettingsHighHost power settings cannot be controlled from an AppVMLowAbuse of legitimate system feature
T1542Pre-OS BootMediumAppVM’s pre-boot environment cannot be modified from within an AppVM. No Secure Boot by defaultHighSecure Boot by default
T1053Scheduled Task/JobMediumImpact localized to single VMLowAbuse of legitimate system feature
T1176Software ExtensionsMediumImpact localized to single VMLowAbuse of legitimate system feature
T1205Traffic SignalingHighPorts cannot be opened externally from a non-netVM. NAT traversal out of scopeMediumWindows Firewall blocks unsolicited inbound traffic by default
T1078Valid AccountsMediumImpact localized to single VM. Valid user account = valid root account for one VMMediumMicrosoft Account set up by default. No default local admin credentials
Total 23/34 11/34
Perc. 67.6% 32.4%
TA0004:
Privilege
Escalation
T1548Abuse Elevation Control MechanismMediumElevation control deemed irrelevant for VMsMediumUAC mostly works, but is click-through and has bypasses
T1098Account ManipulationHighAccounts are not persistent across AppVM rebootsMediumLSA PPL protects credential storage partially. Microsoft Account modification needs additional credentials
T1547Boot or Logon Autostart ExecutionMediumImpact localized to single VM. Many vectors closed off by root non-persistenceLowAbuse of legitimate system feature
T1037Boot or Logon Initialization ScriptsMediumImpact localized to single VM. Many vectors closed off by root non-persistenceLowAbuse of legitimate system feature
T1543Create or Modify System ProcessMediumImpact localized to single VMMediumSCM permissions protect, requires UAC prompt, PPL can help
T1546Event-Triggered ExecutionMediumImpact localized to single VM. Many vectors closed off by root non-persistenceLowAbuse of legitimate system feature
T1068Exploitation for Privilege EscalationHighPrivilege escalation out of VM unlikely, Xen’s attack surface is significantly smaller than other hypervisors’MediumMultiple protection mechanisms that may be helpful: HVCI, DEP, ASLR, CFG, SEHOP, VBS
T1574Hijack Execution FlowMediumImpact localized to single VMMediumCode Integrity Guard is not enabled by default, DLL-sideloading possible
T1055Process InjectionMediumImpact localized to single VMMediumArbitrary Code Guard is not enabled by default. LSASS and antimalware use PPL
T1053Scheduled Task/JobMediumImpact localized to single VMLowAbuse of legitimate system feature
T1078Valid AccountsMediumImpact localized to single VM. Valid user account = valid root account for one VMMediumMicrosoft Account set up by default. No default local admin credentials
Total 13/22 7/22
Perc. 59.1% 31.8%
TA0005:
Defense Evasion
T1548Abuse Elevation Control MechanismMediumElevation control deemed irrelevant for VMsMediumUAC mostly works, but is click-through and has bypasses
T1006Direct Volume AccessHighVirtual block device access irrelevant, otherwise no access to raw volumesMediumPossible, though requires UAC
T1211Exploitation for Defense EvasionHighIn-VM exploits irrelevant to security model. Xen attack surface significantly smaller than other hypervisorsMediumMultiple protection mechanisms that may be helpful: HVCI, DEP, ASLR, CFG, SEHOP, VBS
T1222File and Directory Permissions ModificationHighLargely irrelevant due to security modelMediumPossible, though requires UAC
T1564Hide ArtifactsMediumNo specific safeguards, but forensic analysis made significantly easier due to VM-based modelLowNo specific safeguards or improvements
T1574Hijack Execution FlowMediumImpact localized to single VMMediumCertain mechanisms (SDSM, WRP, KnownDLLs) exist, but user applications are easily bypassable. Abuse of legitimate system feature
T1562Impair DefensesMediumImpact localized to single VMMediumAntimalware tamper protection, PPL. Admin privileges allow for full disabling of security measures
T1070Indicator RemovalLowNo specific safeguards, no logging outside AppVMsMediumCertain log clearing operations require UAC
T1202Indirect Command ExecutionLowNo specific safeguardsLowNo specific safeguards
T1036MasqueradingMediumWindow management in dom0 prevents many masquerading attacksLowProtections for UAC and loginwindow. Significant anti-pattern: hiding file extensions by default. LNK-based attacks easy and effective
T1556Modify Authentication ProcessHighNo real authentication process to modify in AppVMs, cannot modify dom0 authentication from within VMHighLSA PPL enabled by default, requires UAC
T1542Pre-OS BootMediumAppVM’s pre-boot environment cannot be modified from within an AppVM. No Secure Boot by defaultHighSecure Boot by default
T1055Process InjectionMediumImpact localized to single VMMediumArbitrary Code Guard is not enabled by default. LSASS and antimalware use PPL
T1620Reflective Code LoadingMediumNo specific safeguards, impact localized to single VMLowPowershell’s Assembly.Load() unrestricted
T1014RootkitMediumImpact localized to single VM, hypervisor, boot and SMM rootkits not possible from within AppVM. Lack of Secure Boot allows for rootkits embedded via evil-maid attacksMediumHVCI should help significantly in combination with Secure Boot. BYOVD attacks still possible
T1553Subvert Trust ControlsMediumImpact localized to single VMMediumSmartScreen exists, though warnings are click-through. Smart App Control is enabled by default in some regions and for some configurations
T1221Template InjectionMediumImpact localized to single VMMediumProtected View helps, although user interaction for bypass is common and highly impactful
T1205Traffic SignalingHighPorts cannot be opened externally from a non-netVM. NAT traversal out of scopeMediumWindows Firewall blocks unsolicited inbound traffic by default
T1078Valid AccountsMediumImpact localized to single VM. Valid user account = valid root account for one VMMediumMicrosoft Account set up by default. No default local admin credentials
T1497Virtualization/ Sandbox EvasionHighNo specific “safeguards”, malware refusing to run in VMs is beneficialLowNo specific safeguards, malware prefers to run on “bare-metal”
Total 24/40 17/40
Perc. 60.0% 42.5%
TA0006:
Credential
Access
T1110Brute ForceHighDefault LUKS/dm-crypt settings make brute-force attacks infeasibly time-consuming. Same for PAMHighAccount lockout enabled by default. BitLocker is often enabled by default
T1555Credentials from Password StoresMediumImpact localized to single VM. Default Qubes set-up includes dedicated “Vault” VMLowMechanisms exist, but are bypassable in the user context (DPAPI), not enabled (CG) or rarely used (ABE)
T1212Exploitation for Credential AccessMediumApp exploits localized to single VM. Xen attack surface significantly smaller than other hypervisorsMediumMultiple protection mechanisms that may be helpful: HVCI, DEP, ASLR, CFG, SEHOP, VBS
T1056Input CaptureMediumImpact localized to single VMLowNo specific safeguards or disabled by default (ESS)
T1556Modify Authentication ProcessHighNo real authentication process to modify in AppVMs, cannot modify dom0 authentication from within VMMediumLSA PPL enabled by default, requires UAC
T1111Multi-Factor Authentication InterceptionHighQubes u2f-proxy mechanism for U2F available, USB isolation by default, separate e-mail/vault qubeLowMechanisms exist, but are disabled by default (HfB + TPM, EPP is in audit mode by default)
T1040Network SniffingHighNon-proxy VMs cannot sniff other VMs’ network trafficMediumCapturing traffic requires administrator access. SMB signing does not provide secrecy
T1003OS Credential DumpingHighOS-level credentials specifically do not exist in AppVMs by defaultMediumLSA PPL helps, Credential Guard may help but is not always enabled by default
T1539Steal Web Session CookieMediumImpact localized to single VMMediumApp-Bound Encryption enabled by default for Edge
T1552Unsecured CredentialsHighCredentials are stored in isolated Vault VMs assuming correct usageLowMechanisms exist, but are bypassable in the user context (DPAPI), not enabled (CG) or rarely used (ABE)
Total 16/20 7/20
Perc. 80.0% 35.0%
TA0007:
Discovery
T1087Account DiscoveryMediumImpact localized to single VMLowNo specific safeguards
T1010Application Window DiscoveryMediumImpact localized to single VMLowNo specific safeguards
T1217Browser Information DiscoveryMediumImpact localized to single VMLowNo specific safeguards
T1652Device Driver DiscoveryHighLittle to no hardware information in VMLowNo specific safeguards
T1083File and Directory DiscoveryMediumImpact localized to single VMLowNo specific safeguards except permissions. On endpoint desktop systems, the user context is where most files will be accessible
T1680Local Storage DiscoveryHighLocal storage virtualizedLowNo specific safeguards
T1654Log EnumerationMediumImpact localized to single VMMediumCertain logs, like Security, are inaccessible without elevation
T1040Network SniffingHighNon-proxy VMs cannot sniff other VMs’ network trafficMediumCapturing traffic requires administrator access. SMB signing does not provide secrecy
T1201Password Policy DiscoveryMediumNo local passwords = no useful information in VM. Otherwise no safeguards, but impact localized to single VMLowNo specific safeguards
T1120Peripheral Device DiscoveryHighUnless devices are connected specifically to that VM, not possible. USB drives connect via block driver, not USBLowNo specific safeguards
T1069Permission Groups DiscoveryHighNo useful information in VMLowNo specific safeguards
T1057Process DiscoveryMediumImpact localized to single VMLowNo specific safeguards
T1018Remote System DiscoveryLowNo specific safeguardsLowNo specific safeguards
T1518Software DiscoveryLowLocalized to specific template-derived VMs. Assumed consistent across all VMsLowNo specific safeguards (users can query HKLM/…/Uninstall and use WMI queries to Win32_Product
T1082System Information DiscoveryHighNo useful information in VMLowNo specific safeguards
T1614System Location DiscoveryMediumNo location provider in VMs, timezone/IP location available for networked VMsLowDesktop apps using older APIs can bypass permission dialogs without user interaction, timezone/IP location data always available
T1016System Network Configuration DiscoveryMediumVMs cannot see network configuration, some enumeration attacks possible through NATLowNo specific safeguards
T1049System Network Connections DiscoveryHighNo useful information in VMLowNo specific safeguards
T1033System Owner/User DiscoveryHighNo owner information in VMs, unless provided externallyLowNo specific safeguards
T1007System Service DiscoveryMediumLocalized to specific template-derived VMsLowNo specific safeguards
T1124System Time DiscoveryLowSystem time in sync across machineLowNo specific safeguards
T1497Virtualization/ Sandbox EvasionHighNo specific “safeguards”, malware refusing to run in VMs is beneficialLowNo specific safeguards, malware prefers to run on “bare-metal”
Total 28/44 2/44
Perc. 63.6% 4.5%
TA0009:
Collection
T1123Audio CaptureHighMicrophone devices contained within sys-usb or dom0 by defaultLowDesktop apps using older APIs can bypass permission dialogs without user interaction
T1185Browser Session HijackingMediumImpact localized to single VMMediumABE helps protect Microsoft Edge’s sessions
T1115Clipboard DataMediumImpact localized to single VMLowNo specific safeguards
T1005Data from Local SystemMediumImpact localized to single VMLowNo specific safeguards except permissions. On endpoint desktop systems, the user context is where most files will be accessible
T1025Data from Removable MediaHighRemovable devices contained within sys-usb by defaultLowNo specific safeguards
T1114Email CollectionMediumImpact localized to single VMLowNo specific safeguards except for Edge ABE usage
T1056Input CaptureMediumImpact localized to single VMLowNo specific safeguards, except for UAC/loginwindow protection
T1113Screen CaptureMediumImpact localized to single VMLowDesktop apps using older APIs can bypass permission dialogs without user interaction
T1125Video CaptureHighCamera devices contained within sys-usb by defaultLowDesktop apps using older APIs can bypass permission dialogs without user interaction
Total 12/18 1/18
Perc. 66.7% 5.6%
TA0040:
Impact
T1531Account Access RemovalMediumImpact localized to single VMMediumUAC required, though click-through. Microsoft Account more difficult to modify, though with wider-ranging consequences
T1485Data DestructionMediumImpact localized to single VMLowNo specific safeguards, VSS copies absent by default
T1486Data Encrypted for ImpactMediumImpact localized to single VMLowNo specific safeguards, VSS copies absent by default
T1565Data ManipulationMediumImpact localized to single VMLowNo specific safeguards, VSS copies absent by default
T1561Disk WipeMediumImpact localized to single VMLowNo specific safeguards, VSS copies absent by default
T1499Endpoint Denial of ServiceMediumImpact localized to single VMLowNo specific safeguards, apps in user context can easily cause DoS through resource exhaustion
T1495Firmware CorruptionHighAppVMs cannot affect firmware without PCI passthroughMediumCertain types of corruption (non-destructive) stopped by Secure Boot
T1490Inhibit System RecoveryHighAppVMs cannot affect backups (dom0-controlled)MediumWinRE/VSS modifications require UAC elevation
T1498Network Denial of ServiceMediumNon-proxy AppVMs should not be able to cause DoS for other AppVMs.LowWindows is vulnerable to both internal and external Network DoS
T1496Resource HijackingMediumImpact localized to single VMLowNo specific safeguards
T1489Service StopMediumImpact localized to single VMMediumStopping most services require UAC elevation
T1529System Shutdown/RebootMediumImpact localized to single VMLowUsers granted SeShutdownPrivilege by default
Total 14/24 4/24
Perc. 58.3% 16.7%

Appendix B. Scoring Process Examples

The following examples illustrate the scoring process described in Section 4.1, applied to three techniques that showcase different scoring outcomes. For each technique, the process consisted of: (1) consulting the MITRE ATT&CK technique definition, including sub-techniques, procedure examples, and listed mitigations; (2) reviewing official OS documentation, technical reports, and scientific articles for relevant defensive mechanisms; (3) where documentation proved inadequate, performing practical simulations on live installations; and (4) assigning a Low, Medium, or High score based on the criteria defined in Section 4.1, along with a written rationale.

Appendix B.1. T1542: Pre-OS Boot

This technique involves adversaries modifying pre-boot components such as the bootloader or firmware to achieve persistence or evade detection below the OS level [48]. Through an analysis of the documentation and GitHub issues, Qubes OS was assigned a score of Medium. While AppVM pre-boot environments cannot be modified from within an AppVM due to Xen’s isolation, Qubes OS does not support UEFI Secure Boot and requires it to be disabled during installation [49], leaving the host boot chain unprotected. This constitutes partial mitigation through isolation but with the absence of a key protective mechanism. Windows 11 was assigned a score of High, as Secure Boot is enabled by default and required for hardware certification [50]. Combined with Measured Boot and TPM-backed attestation, this provides near-complete protection of the boot chain against unauthorized modification.

Appendix B.2. T1110: Brute Force

This technique involves adversaries attempting to gain credential access through systematic guessing, including password spraying, credential stuffing and offline attacks [51]. Both operating systems were assigned a score of High, albeit for different reasons. Qubes OS uses LUKS2 full-disk encryption with Argon2id key derivation by default, making offline brute-force attacks against disk encryption infeasible [52]. The Pluggable Authentication Module (PAM) subsystem is configured with faillock, locking accounts after three failed attempts within a 15 min window, with a 10 min unlock time [53]. Windows 11 enables a default account lockout policy (10 failed attempts trigger a 10 min lockout) and BitLocker full-disk encryption is often enabled by default with TPM protection [54]. In both cases, the combination of online and offline brute-force protections was deemed difficult to circumvent without significant user interaction.

Appendix B.3. T1123: Audio Capture

This technique involves adversaries using OS or application APIs to capture audio from the device microphone [55]. Qubes OS was assigned a score of High. Audio input is not sent to VMs by default and must be explicitly enabled by the user on a per-VM basis via the qvm-device mic command or through the GUI [56]. This constitutes complete mitigation through hardware isolation at the vchan protocol level. Windows 11 was assigned a score of Low. While Windows 11 provides microphone permission controls for Store applications, desktop applications using older Win32 APIs can bypass the permission model and access the microphone without user interaction. This provides next to no effective default mitigation against this technique [57]. In order to fully confirm the lack of mitigation, we installed an application that utilizes legacy Win32 APIs for microphone access on a Windows 11 machine. No permission window appeared and the application immediately had microphone access, confirming the scoring level.

References

  1. Kapera, A.; Niemiec, M. Dynamic Risk Thresholds for SIEM Alerting Based on Machine Learning. IEEE Access 2025, 13, 121034–121047. [Google Scholar] [CrossRef]
  2. Kurek, T.; Niemiec, M.; Lason, A. Taking back control of privacy: A novel framework for preserving cloud-based firewall policy confidentiality. Int. J. Inf. Secur. 2015, 15, 235–250. [Google Scholar] [CrossRef][Green Version]
  3. Maglaras, L.; Kantzavelou, I.; Ferrag, M.A. Digital Transformation and Cybersecurity of Critical Infrastructures. Appl. Sci. 2021, 11, 8357. [Google Scholar] [CrossRef]
  4. Marusak, P.; Nebeluk, R.; Wojtulewicz, A.; Cabaj, K.; Chaber, P.; Ławryńczuk, M.; Plamowski, S.; Zarzycki, K. Efficient Cyberattack Detection Methods in Industrial Control Systems. Sensors 2024, 24, 3860. [Google Scholar] [CrossRef] [PubMed]
  5. The MITRE Corporation. Enterprise Matrix v18|MITRE ATT&CK®. 2025. Available online: https://attack.mitre.org/versions/v18/matrices/enterprise/ (accessed on 12 March 2026).
  6. Cyber, T.; Institute, C. Multi-Source Analysis of Top MITRE ATT&CK Techniques; Technical Report; Cyentia Institute: Leesburg, VA, USA, 2023. [Google Scholar]
  7. Ahmed, M.; Panda, S.; Xenakis, C.; Panaousis, E. MITRE ATT&CK-driven Cyber Risk Assessment. In Proceedings of the ARES ’22: 17th International Conference on Availability, Reliability and Security, New York, NY, USA, 23–26 August 2022; pp. 1–10. [Google Scholar] [CrossRef]
  8. Oruc, A.; Amro, A.; Gkioulos, V. Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework. Sensors 2022, 22, 8745. [Google Scholar] [CrossRef] [PubMed]
  9. Mohamed, I.; Hefny, H.A.; Darwish, N.R. Enhancing cybersecurity defenses: A multicriteria decision-making approach to MITRE ATT&CK mitigation strategy. Int. J. Comput. Netw. Commun. 2024, 16, 17. [Google Scholar] [CrossRef]
  10. Sharma, A.; Khilji, N. Imperative Observation of Security in Qubes Operating System and User Anonymity in Digital Epoch. In Proceedings of the 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON), New Delhi, India, 21–23 November 2024; pp. 1–4. [Google Scholar] [CrossRef]
  11. Issa, A.; Murray, T.; Ernst, G. In search of perfect users: Towards understanding the usability of converged multi-level secure user interfaces. In Proceedings of the 30th Australian Conference on Computer-Human Interaction, Melbourne Australia, 4–7 December 2018; pp. 572–576. [Google Scholar] [CrossRef]
  12. Lefeuvre, H.; Dautenhahn, N.; Chisnall, D.; Olivier, P. SoK: Software Compartmentalization. In Proceedings of the 2025 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 12–15 May 2025; pp. 3107–3126. [Google Scholar] [CrossRef]
  13. Beaumont, M.R. Cross Domain Desktop Compositor. AU AU2016262117B2, 24 June 2021. [Google Scholar]
  14. Singh, G.K.; Somani, G. Cross-VM Attacks: Attack Taxonomy, Defense Mechanisms, and New Directions. In Versatile Cybersecurity; Conti, M., Somani, G., Poovendran, R., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 257–286. [Google Scholar] [CrossRef]
  15. Motiee, S.; Hawkey, K.; Beznosov, K. Do Windows Users Follow the Principle of Least Privilege? Investigating User Account Control Practices. In Proceedings of the CHI ’10 Extended Abstracts on Human Factors in Computing Systems, Atlanta, GA, USA, 10–15 April 2010; pp. 4129–4134. [Google Scholar] [CrossRef]
  16. Escritt, T. Europeans seek ‘digital sovereignty’ as US tech firms embrace Trump. Reuters, 23 June 2025. Available online: https://www.reuters.com/business/media-telecom/europeans-seek-digital-sovereignty-us-tech-firms-embrace-trump-2025-06-21/ (accessed on 12 March 2026).
  17. Free Software Foundation Europe. Public Money, Public Code. 2025. Available online: https://publiccode.eu/en/ (accessed on 12 March 2026).
  18. Saunders, M. Danish Ministry Switching from Microsoft Office/365 to LibreOffice. 2025. Available online: https://blog.documentfoundation.org/blog/2025/07/08/danish-ministry-switching-from-microsoft-office-365-to-libreoffice/ (accessed on 12 March 2026).
  19. Gesellschaft für Informatik e.V. Präsidiumsarbeitskreis “Digitale Souveränität”. 2025. Available online: https://pak-digs.gi.de/ (accessed on 12 March 2026).
  20. Krempl, S. Goodbye, Microsoft: Schleswig-Holstein relies on Open Source and Saves Millions. Heise Online, 7 December 2025. Available online: https://www.heise.de/en/news/Goodbye-Microsoft-Schleswig-Holstein-relies-on-Open-Source-and-saves-millions-11105459.html (accessed on 12 March 2026).
  21. Qubes OS Project. Software License. 2025. Available online: https://doc.qubes-os.org/en/latest/developer/code/license.html (accessed on 12 March 2026).
  22. McMahon, P. When Security Matters: Working with Qubes OS at the Guardian. 2024. Available online: https://theguardian.engineering/blog/info-2024-apr-04-when-security-matters-working-with-qubes-os-at-the-guardian (accessed on 12 March 2026).
  23. Freedom of the Press Foundation. SecureDrop Workstation. 2025. Available online: https://securedrop.org/ (accessed on 12 March 2026).
  24. Weck, G. SYS.bd.2.8: Qubes OS Clients. 2022. Available online: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/Hilfsmittel/Benutzerdefinierte_BS/BS_Clients_unter_Qubes_OS_EN.html?nn=943082 (accessed on 12 March 2026).
  25. Qubes OS Project. Introduction. 2025. Available online: https://doc.qubes-os.org/en/latest/introduction/intro.html (accessed on 12 March 2026).
  26. Mansfield-Devine, S. Security through isolation. Comput. Fraud. Secur. 2010, 2010, 8–11. [Google Scholar] [CrossRef]
  27. Qubes OS Project. Qubes Windows Tools (QWT). 2025. Available online: https://doc.qubes-os.org/en/latest/user/templates/windows/qubes-windows-tools.html (accessed on 12 March 2026).
  28. MirageOS. Mirage/Qubes-Mirage-Firewall. 2025. Available online: https://github.com/mirage/qubes-mirage-firewall (accessed on 12 March 2026).
  29. Qubes OS Project. Templates. 2025. Available online: https://doc.qubes-os.org/en/latest/user/templates/templates.html (accessed on 12 March 2026).
  30. Rutkowska, J. Introducing the Next Generation Qubes Core Stack. 2017. Available online: https://www.qubes-os.org/news/2017/10/03/core3/ (accessed on 12 March 2026).
  31. Qubes OS Project. How to Use Disposables. 2025. Available online: https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-use-disposables.html (accessed on 12 March 2026).
  32. Qubes OS Project. Standalones and HVMs. 2025. Available online: https://doc.qubes-os.org/en/latest/user/advanced-topics/standalones-and-hvms.html (accessed on 12 March 2026).
  33. Microsoft Corporation. Windows 11 Security Book. 2023. Available online: https://www.microsoft.com/content/dam/microsoft/final/en-us/microsoft-brand/documents/MSFT-Windows11-Security-book_Sept2023.pdf (accessed on 12 March 2026).
  34. Microsoft Corporation. Credential Guard Overview. 2025. Available online: https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/ (accessed on 12 March 2026).
  35. Microsoft Corporation. Exploit Protection Reference—Microsoft Defender for Endpoint. 2025. Available online: https://learn.microsoft.com/en-us/defender-endpoint/exploit-protection-reference (accessed on 12 March 2026).
  36. Afonin, O. Browser Forensics in 2026: App-Bound Encryption and Live Triage. 2026. Available online: https://blog.elcomsoft.com/2026/01/browser-forensics-in-2026-app-bound-encryption-and-live-triage/ (accessed on 12 March 2026).
  37. Smith, C.; Kanthak, S. Abuse Elevation Control Mechanism: Bypass User Account Control, Sub-Technique T1548.002. 2025. Available online: https://attack.mitre.org/techniques/T1548/002/ (accessed on 12 March 2026).
  38. Invisible Things Lab. Contributors. Qubes OS: A Reasonably Secure Operating System. 2025. Available online: https://www.qubes-os.org/ (accessed on 12 March 2026).
  39. Microsoft Corporation. Windows 11. 2025. Available online: https://www.microsoft.com/en-us/windows/windows-11 (accessed on 12 March 2026).
  40. Qubes OS Project. Endorsements. 2025. Available online: https://www.qubes-os.org/endorsements/ (accessed on 12 March 2026).
  41. StatCounter. Operating System Market Share Worldwide. 2025. Available online: https://gs.statcounter.com/os-market-share (accessed on 12 March 2026).
  42. Cybersecurity and Infrastructure Security Agency; United States Secret Service. Conti Ransomware. 2022. Available online: https://www.cisa.gov/news-events/alerts/2021/09/22/conti-ransomware (accessed on 12 March 2026).
  43. Naeem, D.; BT Security. Conti, Software S0575. 2025. Available online: https://attack.mitre.org/software/S0575/ (accessed on 12 March 2026).
  44. The MITRE Corporation Contributors. Mitre-Attack/Attack-Navigator. 2025. Available online: https://github.com/mitre-attack/attack-navigator (accessed on 12 March 2026).
  45. The MITRE Corporation. SolarWinds Compromise, Campaign C0024. 2025. Available online: https://attack.mitre.org/campaigns/C0024/ (accessed on 12 March 2026).
  46. LinuxBoot Project. About Heads. 2025. Available online: http://osresearch.net/ (accessed on 12 March 2026).
  47. 3mdeb; Gołaś, F. Dasharo TrustRoot Fusing. 2025. Available online: https://docs.dasharo.com/guides/cpu-fusing/ (accessed on 12 March 2026).
  48. The MITRE Corporation. Pre-OS Boot, Technique T1542—Enterprise|MITRE ATT&CK®. 2025. Available online: https://attack.mitre.org/techniques/T1542/ (accessed on 25 April 2026).
  49. Weiss, J. Secure Boot Support. 2025. Available online: https://github.com/QubesOS/qubes-issues/issues/4371 (accessed on 25 April 2026).
  50. Microsoft Corporation. Windows 11 System Requirements. 2026. Available online: https://support.microsoft.com/en-us/windows/windows-11-system-requirements-86c11283-ea52-4782-9efd-7674389a7ba3 (accessed on 25 April 2026).
  51. The MITRE Corporation. Brute Force, Technique T1110—Enterprise|MITRE ATT&CK®. 2025. Available online: https://attack.mitre.org/techniques/T1110/ (accessed on 25 April 2026).
  52. Fruhwirth, C.; Broz, M.; Wagner, A. Cryptsetup(8). 2025. Available online: https://www.man7.org/linux/man-pages/man8/cryptsetup.8.html (accessed on 25 April 2026).
  53. Mraz, T.; Ward, B. Faillock.conf(5). 2026. Available online: https://man7.org/linux/man-pages/man5/faillock.conf.5.html (accessed on 25 April 2026).
  54. Listek, A. Default Account Lockout Policies in Windows 11. 2025. Available online: https://specopssoft.com/blog/default-account-lockout-policies-in-windows-11/ (accessed on 25 April 2026).
  55. The MITRE Corporation. Audio Capture, Technique T1123—Enterprise|MITRE ATT&CK®. 2025. Available online: https://attack.mitre.org/techniques/T1123/ (accessed on 25 April 2026).
  56. Qubes OS Project. Audio Virtualization. 2025. Available online: https://doc.qubes-os.org/en/latest/developer/system/audio.html (accessed on 25 April 2026).
  57. Microsoft Corporation. Windows Camera, Microphone, and Privacy. 2026. Available online: https://support.microsoft.com/en-us/windows/windows-camera-microphone-and-privacy-a83257bc-e990-d54a-d212-b5e41beba857 (accessed on 25 April 2026).
Figure 1. Qubes OS security architecture overview [25].
Figure 1. Qubes OS security architecture overview [25].
Electronics 15 02110 g001
Figure 2. Qubes OS template architecture. Adapted from [30].
Figure 2. Qubes OS template architecture. Adapted from [30].
Electronics 15 02110 g002
Figure 3. MITRE ATT&CK Navigator layer showcasing TTPs used in the Conti campaign.
Figure 3. MITRE ATT&CK Navigator layer showcasing TTPs used in the Conti campaign.
Electronics 15 02110 g003
Figure 4. Percentage of mitigated techniques by each operating system per ATT&CK tactic.
Figure 4. Percentage of mitigated techniques by each operating system per ATT&CK tactic.
Electronics 15 02110 g004
Figure 5. Percentage point difference in tactic mitigation between analyzed operating systems.
Figure 5. Percentage point difference in tactic mitigation between analyzed operating systems.
Electronics 15 02110 g005
Figure 6. Percentage of mitigated Conti techniques per ATT&CK tactic by operating system.
Figure 6. Percentage of mitigated Conti techniques per ATT&CK tactic by operating system.
Electronics 15 02110 g006
Figure 7. Percentage of mitigated Solar Winds techniques per ATT&CK tactic by operating system.
Figure 7. Percentage of mitigated Solar Winds techniques per ATT&CK tactic by operating system.
Electronics 15 02110 g007
Table 1. Summary statistics for all tactics.
Table 1. Summary statistics for all tactics.
MetricQubes OSWindows 11
Total143/22256/222
Total (%)64%25%
Min58 pp5 pp
Median64 pp32 pp
Max80 pp43 pp
μ 65 pp25 pp
σ 7 pp14 pp
CV10%52%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kapera, A.; Niemiec, M. A Methodology for Quantitative Security Evaluation of Operating Systems: Scenario-Based Comparison of Qubes OS and Windows 11. Electronics 2026, 15, 2110. https://doi.org/10.3390/electronics15102110

AMA Style

Kapera A, Niemiec M. A Methodology for Quantitative Security Evaluation of Operating Systems: Scenario-Based Comparison of Qubes OS and Windows 11. Electronics. 2026; 15(10):2110. https://doi.org/10.3390/electronics15102110

Chicago/Turabian Style

Kapera, Artur, and Marcin Niemiec. 2026. "A Methodology for Quantitative Security Evaluation of Operating Systems: Scenario-Based Comparison of Qubes OS and Windows 11" Electronics 15, no. 10: 2110. https://doi.org/10.3390/electronics15102110

APA Style

Kapera, A., & Niemiec, M. (2026). A Methodology for Quantitative Security Evaluation of Operating Systems: Scenario-Based Comparison of Qubes OS and Windows 11. Electronics, 15(10), 2110. https://doi.org/10.3390/electronics15102110

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop