Asian Journal of Information Technology

Year: 2017
Volume: 16
Issue: 6
Page No. 458 - 464

Malware Research Directions: A Look into Ransomware

Authors : Mohammed A.F. Salah, Mohd Fadzli Marhusin and Rossilawati Sulaiman

References

Ahmadian, M.M., H.R. Shahriari and S.M. Ghaffarian, 2015. Connection-monitor and connection-breaker: A novel approach for prevention and detection of high survivable ransomwares. Proceedings of the 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC’15), September 8-10, 2015, IEEE, Rasht, Iran, ISBN:978-1-4673-7609-9, pp: 79-84.

Aman, W., 2014. A framework for analysis and comparison of dynamic malware analysis tools. Intl. J. Netw. Secur. Appl., 6: 63-74.
CrossRef  |  Direct Link  |  

Bhardwaj, A., V. Avasthi, H. Sastry and G.V.B. Subrahmanyam, 2016. Ransomware digital extortion: A rising new age threat. Indian J. Sci. Technol., 9: 1-5.
CrossRef  |  Direct Link  |  

Chen, H., D. Dean and D. Wagner, 2004. Model checking one million lines of C code. Proceedings of the 11th Annual Symposium on Network and Distributed System Security (NDSS’04) Vol. 4, February 5-6, 2004, Catamaran Resort Hotel and Spa, San Diego, California, pp: 171-185.

Egele, M., T. Scholte, E. Kirda and C. Kruegel, 2012. A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surveys, Vol. 44. 10.1145/2089125.2089126

Feng, H.H., J.T. Giffin, Y. Huang, S. Jha, W. Lee and B.P. Miller, 2004. Formalizing sensitivity in static analysis for intrusion detection. Proceedings of the IEEE Symposium on Security and Privacy, May 9-12, 2004, Berkeley, CA., USA., pp: 194-208.

Gandotra, E., D. Bansal and S. Sofat, 2014. Malware analysis and classification: A survey. J. Inf. Sec., 2014: 1-9.
CrossRef  |  Direct Link  |  

Gazet, A., 2010. Comparative analysis of various ransomware virii. J. Comput. Virol., 6: 77-90.
Direct Link  |  

Jacob, G., H. Debar and E. Filiol, 2008. Behavioral detection of malware: From a survey towards an established taxonomy. J. Comput. Virol., 4: 251-266.
Direct Link  |  

Jerlin, M.A. and C. Jayakumar, 2015. A dynamic malware analysis for windows platform-a survey. Indian J. Sci. Technol., 8: 1-5.
Direct Link  |  

Kaur, P. and S. Sharma, 2014. Literature analysis on malware detection. Intl. J. Electron. Electr. Eng., 7: 717-722.
Direct Link  |  

Kharraz, A., S. Arshad, C. Mulliner, W.K. Robertson and E. Kirda, 2016. UNVEIL: A large-scale, automated approach to detecting ransomware. Proceedings of the 25th Symposium on USENIX Security, August 10-12, 2016, USENIX, Austin, Texas, ISBN:978-1-931971-32-4, pp: 757-772.

Kharraz, A., W. Robertson, D. Balzarotti, L. Bilge and E. Kirda, 2015. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. In: Detection of Intrusions and Malware and Vulnerability Assessment, Almgren, M., V. Gulisano and F. Maggi (Eds.). Springer, Cham, Switzerland, ISBN:978-3-319-20549-6, pp: 3-24.

Kim, D., W. Soh and S. Kim, 2015. Design of quantification model for prevent of cryptolocker. Indian J. Sci. Technol., 8: 203-207.
Direct Link  |  

Lee, J.K., S.Y. Moon and J.H. Park, 2017. CloudRPS: A cloud analysis based enhanced ransomware prevention system. J. Supercomputing, 73: 3065-3084.
Direct Link  |  

Ligh, M.W., 2011. Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code. John Wiley & Sons, Hoboken, New Jersey, USA., Pages: 716.

Marhusin, M.F., 2012. Improving the effectiveness of behaviour-based malware detection. Ph.D Thesis, University of New South Wales, Kensington, New South Wales.

Mathur, K. and S. Hiranwal, 2013. A survey on techniques in detection and analyzing malware executables. Intl. J. Adv. Res. Comput. Sci. Software Eng., 3: 422-428.
Direct Link  |  

Priyadarshi, S., 2011. Metamorphic detection via emulation. Master’s Thesis, San Jose State University, San Jose, California, USA.

Savage, K., P. Coogan and H. Lau, 2015. Security response: The evolution of ransomware. Symantec, Mountain View, California, USA. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-ransomware.pdf.

Scaife, N., H. Carter, P. Traynor and K.R. Butler, 2016. Cryptolock (and drop it): Stopping ransomware attacks on user data. Proceedings of the 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS’16), June 27-30, 2016, IEEE, Nara, Japan, ISBN:978-1-5090-1484-2, pp: 303-312.

Scott, J. and D. Spaniel, 2016. ICIT ransomware report. Master Thesis, Institute for Critical Infrastructure Technology, Washington, DC., USA.

Singh, N. and D.S.S. Khurmi, 2015. Malware analysis, clustering and classification: A literature review. Intl. J. Comput. Sci. Technol., 6: 68-72.
Direct Link  |  

Symantec, 2016. ICIT ransomware report. Symantec, Mountain View, California, USA.

Tobergte, D.R. and S. Curtis, 2013. Improved docking of polypeptides with glide. J. Chem. Inf. Model., 53: 1689-1699.
CrossRef  |  Direct Link  |  

Woburn, M.A., 2016. Crypto-ransomware attacks rise five-fold to hit over 700,000 users in one year. Kaspersky Lab, Moscow, Russia. https://www.kaspersky.com/about/news/virus/2016/crypto-ransomware-attacks-rise-five-fold-to-hit-718-thousand-users-in-one-year.

Zavarsky, P. and D. Lindskog, 2016. Experimental analysis of ransomware on windows and android platforms: Evolution and characterization. Procedia Comput. Sci., 94: 465-472.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved