Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
Ransomware has grown to be a dominant cybersecurity threat, by exfiltrating, encrypting or
destroying valuable user data, and causing numerous disruptions to victims. The severity of …
destroying valuable user data, and causing numerous disruptions to victims. The severity of …
[HTML][HTML] Applying staged event-driven access control to combat ransomware
The advancement of modern Operating Systems (OSs), and the popularity of personal
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …
An ontology-driven framework for knowledge representation of digital extortion attacks
M Keshavarzi, HR Ghaffary - Computers in Human Behavior, 2023 - Elsevier
With the COVID-19 pandemic and the growing influence of the Internet in critical sectors of
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …
Obfuscation-resilient android malware analysis based on complementary features
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …
Motif: A malware reference dataset with ground truth family labels
Malware family classification is a significant issue with public safety and research
implications that has been hindered by the high cost of expert labels. The vast majority of …
implications that has been hindered by the high cost of expert labels. The vast majority of …
[PDF][PDF] Current multi-factor of authentication: Approaches, requirements, attacks and challenges
AHY Mohammed, RA Dziyauddin… - International Journal of …, 2023 - eprints.utm.my
Now-a-days, with the rapid and broad emergence of local or remote access to services on
the internet. Authentication represents an important security control requirement and the …
the internet. Authentication represents an important security control requirement and the …
A survey of machine learning methods and challenges for windows malware classification
E Raff, C Nicholas - arXiv preprint arXiv:2006.09271, 2020 - arxiv.org
Malware classification is a difficult problem, to which machine learning methods have been
applied for decades. Yet progress has often been slow, in part due to a number of unique …
applied for decades. Yet progress has often been slow, in part due to a number of unique …
Gpthreats-3: Is automatic malware generation a threat?
M Botacin - 2023 IEEE Security and Privacy Workshops (SPW), 2023 - ieeexplore.ieee.org
Recent research advances introduced large textual models, of which GPT-3 is state-of-the-
art. They enable many applications, such as generating text and code. Whereas the model's …
art. They enable many applications, such as generating text and code. Whereas the model's …
Antiviruses under the microscope: A hands-on perspective
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …
research has been done about them, especially proposing new detection procedures that …
[HTML][HTML] WebAssembly diversification for malware evasion
WebAssembly has become a crucial part of the modern web, offering a faster alternative to
JavaScript in browsers. While boosting rich applications in browser, this technology is also …
JavaScript in browsers. While boosting rich applications in browser, this technology is also …