Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration

T McIntosh, T Susnjak, T Liu, D Xu, P Watters… - ACM Computing …, 2024 - dl.acm.org
Ransomware has grown to be a dominant cybersecurity threat, by exfiltrating, encrypting or
destroying valuable user data, and causing numerous disruptions to victims. The severity of …

[HTML][HTML] Applying staged event-driven access control to combat ransomware

T McIntosh, ASM Kayes, YPP Chen, A Ng… - Computers & Security, 2023 - Elsevier
The advancement of modern Operating Systems (OSs), and the popularity of personal
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …

An ontology-driven framework for knowledge representation of digital extortion attacks

M Keshavarzi, HR Ghaffary - Computers in Human Behavior, 2023 - Elsevier
With the COVID-19 pandemic and the growing influence of the Internet in critical sectors of
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …

Obfuscation-resilient android malware analysis based on complementary features

C Gao, M Cai, S Yin, G Huang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …

Motif: A malware reference dataset with ground truth family labels

RJ Joyce, D Amlani, C Nicholas, E Raff - Computers & Security, 2023 - Elsevier
Malware family classification is a significant issue with public safety and research
implications that has been hindered by the high cost of expert labels. The vast majority of …

[PDF][PDF] Current multi-factor of authentication: Approaches, requirements, attacks and challenges

AHY Mohammed, RA Dziyauddin… - International Journal of …, 2023 - eprints.utm.my
Now-a-days, with the rapid and broad emergence of local or remote access to services on
the internet. Authentication represents an important security control requirement and the …

A survey of machine learning methods and challenges for windows malware classification

E Raff, C Nicholas - arXiv preprint arXiv:2006.09271, 2020 - arxiv.org
Malware classification is a difficult problem, to which machine learning methods have been
applied for decades. Yet progress has often been slow, in part due to a number of unique …

Gpthreats-3: Is automatic malware generation a threat?

M Botacin - 2023 IEEE Security and Privacy Workshops (SPW), 2023 - ieeexplore.ieee.org
Recent research advances introduced large textual models, of which GPT-3 is state-of-the-
art. They enable many applications, such as generating text and code. Whereas the model's …

Antiviruses under the microscope: A hands-on perspective

M Botacin, FD Domingues, F Ceschin, R Machnicki… - Computers & …, 2022 - Elsevier
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …

[HTML][HTML] WebAssembly diversification for malware evasion

J Cabrera-Arteaga, M Monperrus, T Toady… - Computers & Security, 2023 - Elsevier
WebAssembly has become a crucial part of the modern web, offering a faster alternative to
JavaScript in browsers. While boosting rich applications in browser, this technology is also …