2019
DOI: 10.17148/ijarcce.2019.8461
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Ransomware - Specific Properties using Static Analysis of Executables

Abstract: Ransomware attacks have risen exponentially over the past decade with increasing severity, potency to cause damage, and ease of carrying out attack. The conventional anti-malware techniques are compelled to include advanced ransomware detection mechanisms. This paper presents the results of the study and analysis of ransomware executable files in order to identify the characteristic properties that distinguish ransomware from other malware and benign executable files. The program binaries are analyzed statical… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…This necessitates the consideration and implementation of deceptive methodologies, such as the deployment of honeypots [2], [45]. These honeypots serve a dual purpose: they act as baits to lure potential ransomware threats, thereby allowing for their early identification and comprehensive analysis, and they function as a means to safeguard the broader network infrastructure from the damaging impact of these threats [46], [47].…”
Section: B Strategic Adjustments In Cyber Defensementioning
confidence: 99%
“…This necessitates the consideration and implementation of deceptive methodologies, such as the deployment of honeypots [2], [45]. These honeypots serve a dual purpose: they act as baits to lure potential ransomware threats, thereby allowing for their early identification and comprehensive analysis, and they function as a means to safeguard the broader network infrastructure from the damaging impact of these threats [46], [47].…”
Section: B Strategic Adjustments In Cyber Defensementioning
confidence: 99%
“…Initial entry points often involve social engineering, spear-phishing campaigns, and exploitation of software vulnerabilities [32]. Once inside a system, ransomware typically escalates its privileges to execute its payload [33]. This process often involves a series of complex steps designed to avoid detection by security software [22].…”
Section: A Evolution and Mechanisms Of Ransomwarementioning
confidence: 99%
“…As such, reliance solely on network security is insufficient in providing comprehensive protection against ransomware [31], [32]. The current landscape of ransomware defense has a clear gap in effective post-infection recovery solutions [33], [34]. The limitations of antivirus software, educational efforts, and network security measures highlight the urgency for innovative approaches in ransomware mitigation, particularly in the realm of data recovery [35].…”
Section: Introductionmentioning
confidence: 99%
“…As such, reliance solely on network security is insufficient in providing comprehensive protection against ransomware [31], [32]. The current landscape of ransomware defense has a clear gap in effective post-infection recovery solutions [33], [34].…”
Section: Introductionmentioning
confidence: 99%