2021 3rd International Cyber Resilience Conference (CRC) 2021
DOI: 10.1109/crc50527.2021.9392529
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware Anti-Analysis and Evasion Techniques: A Survey and Research Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(22 citation statements)
references
References 33 publications
0
22
0
Order By: Relevance
“…Data-centric identification aims to track the sources being affected rather than the malicious operation causing the attack [19]. Data-centric crypto ransomware identification techniques [4][5][6][7][8][9] have been explored in several studies. To identify anomalous modifications, most of these solutions offered rely on analyzing user-related documents on a continual basis.…”
Section: Data Centric-based Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…Data-centric identification aims to track the sources being affected rather than the malicious operation causing the attack [19]. Data-centric crypto ransomware identification techniques [4][5][6][7][8][9] have been explored in several studies. To identify anomalous modifications, most of these solutions offered rely on analyzing user-related documents on a continual basis.…”
Section: Data Centric-based Approachesmentioning
confidence: 99%
“…Equation ( 5) consists of two parts: the relevance term ( 6) and redundancy term (7). In addition, the redundancy term has two sub-terms: marginal redundancy (8) and conditional redundancy (9).…”
Section: Features Selection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…With the highly skilled attackers [1], and zero-day vulnerabilities, the number and complexity of sophisticated cyberattacks are increasing [2]. Ransomware [3] and unauthorized cryptomining [4] are the most common threats in the wild [5]. Recently, ransomware and cryptojacking incidents have been observed under an emerging threat: "Fileless malware" that is ten times more successful than the other file-based attacks [6].…”
Section: Introductionmentioning
confidence: 99%
“…Although in-browser cryptojacking attacks declined after Coinhive (in-browser crypto-mining service) shutdown in March 2019, in-memory cryptojacking is one of the most prevalent threats in the wild [5]. It was observed 25% more cryptocurrency mining malware in 2020 over 2019 levels [31].…”
Section: Introductionmentioning
confidence: 99%