Crypto-ransomware: A revision of the state of the art, advances and challenges

JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …

Malware detection with artificial intelligence: A systematic literature review

MG Gaber, M Ahmed, H Janicke - ACM Computing Surveys, 2024 - dl.acm.org
In this survey, we review the key developments in the field of malware detection using AI and
analyze core challenges. We systematically survey state-of-the-art methods across five …

From text to mitre techniques: Exploring the malicious use of large language models for generating cyber attack payloads

PV Charan, H Chunduri, PM Anand… - arXiv preprint arXiv …, 2023 - arxiv.org
This research article critically examines the potential risks and implications arising from the
malicious utilization of large language models (LLM), focusing specifically on ChatGPT and …

HiPeR-Early detection of a ransomware attack using hardware performance counters

PM Anand, PVS Charan, SK Shukla - Digital Threats: Research and …, 2023 - dl.acm.org
Ransomware has been one of the most prevalent forms of malware over the previous
decade, and it continues to be one of the most significant threats today. Recently …

Adapt: Adaptive camouflage based deception orchestration for trapping advanced persistent threats

VSC Putrevu, S Mukhopadhyay, S Manna… - … Threats: Research and …, 2024 - dl.acm.org
Honeypots serve as a valuable deception technology, enabling security teams to gain
insights into the behaviour patterns of attackers and investigate cyber security breaches …

DKaaS: DARK-KERNEL as a service for active cyber threat intelligence

PVS Charan, G Ratnakaram, H Chunduri… - Computers & …, 2023 - Elsevier
Abstract Cyber Threat Intelligence (CTI) plays an indispensable role in providing evidence-
based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …

A Framework for Advanced Persistent Threat Attribution using Zachman Ontology

VSC Putrevu, H Chunduri, MA Putrevu… - Proceedings of the 2023 …, 2023 - dl.acm.org
Advanced Persistent Threat (APT) is a type of cyber attack that infiltrates a targeted
organization and exfiltrates sensitive data over an extended period of time or to cause …

Applying moving target defense against data theft ransomware on windows os

S Liu, X Chen - 2023 - preprints.org
This study addresses the escalating threat of data theft ransomware, a form of cyberattack
that exfiltrates sensitive information from victim networks and demands ransom for its non …

RD-FAXID: Ransomware Detection with FPGA-Accelerated XGBoost

A Gajjar, P Kashyap, A Aysu, P Franzon… - ACM Transactions on …, 2024 - dl.acm.org
Over the last decade, there has been a rise in cyberattacks, particularly ransomware,
causing significant disruption and financial repercussions across public and private sectors …

Mitigating data exfiltration ransomware through advanced decoy file strategies

S Liu, X Chen - 2023 - researchsquare.com
This study introduces an advanced decoy file strategy utilizing Generative Adversarial
Networks (GANs) to combat data exfiltration ransomware threats. Focused on creating highly …