2021 Tenth International Conference on Intelligent Computing and Information Systems (ICICIS) 2021
DOI: 10.1109/icicis52592.2021.9694154
|View full text |Cite
|
Sign up to set email alerts
|

SALAM Ransomware Behavior Analysis Challenges and Decryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…Yamany et al [22] the experimental work conducted to investigate the behaviour of the SALAM ransomware was detailed, employing both static and dynamic analysis techniques. The authors utilized reverse engineering to identify intriguing strings, imports, and network activities associated with the ransomware.…”
Section: Chen Et Almentioning
confidence: 99%
See 1 more Smart Citation
“…Yamany et al [22] the experimental work conducted to investigate the behaviour of the SALAM ransomware was detailed, employing both static and dynamic analysis techniques. The authors utilized reverse engineering to identify intriguing strings, imports, and network activities associated with the ransomware.…”
Section: Chen Et Almentioning
confidence: 99%
“…Early detection and prediction of ransomware attacks against industrial control systems Explored opportunities for early detection and prediction of ransomware attacks on industrial control systems using a combination of network traffic analysis and machine learning techniques. Yamany et al [22] 2021 SALAM Ransomware Behavior Analysis Challenges and Decryption…”
Section: Dynamic Analysismentioning
confidence: 99%
“…Further, there's growing interest in how ransomware interacts with file systems-its frequency and methods of accessing, altering, or erasing files [3], [6]. Attention is also being given to analyzing ransomware's network behaviors, particularly focusing on identifying uncommon outbound traffic that may signify attempts at data exfiltration [14], [32]. Additionally, exploring how ransomware circumvents security measures is gaining traction, with studies aimed at understanding and neutralizing its techniques for evading detection by security solutions [19], [16].…”
Section: A Behavioral Analysis Of Ransomwarementioning
confidence: 99%
“…Within this context, memory forensics has come to the forefront as a formidable instrument in the ongoing struggle against ransomware, providing researchers with the means to examine these threats within their operational environment and extract valuable insights from the behaviors they exhibit while active [6], [12]. Furthermore, the integration of Advanced Language Models, such as LLaMA, into the domain of pattern recognition marks a forward-thinking step in the endeavor to pinpoint and comprehend the multifaceted signatures and behaviors exhibited by ransomware, which may have been obfuscated or otherwise challenging to detect [13], [14].…”
Section: Entropy and Memory Forensics In Ransomwarementioning
confidence: 99%
“…Further, there's growing interest in how ransomware interacts with file systems-its frequency and methods of accessing, altering, or erasing files [3], [6]. Attention is also being given to analyzing ransomware's network behaviors, particularly focusing on identifying uncommon outbound traffic that may signify attempts at data exfiltration [14], [32]. Additionally, exploring how ransomware circumvents security measures is gaining traction, with studies aimed at understanding and neutralizing its techniques for evading detection by security solutions [19], [16].…”
Section: A Behavioral Analysis Of Ransomwarementioning
confidence: 99%