This master's thesis seeks to design, implement, and point out new techniques for obfuscation of ransomware activity using the entropy principles of data that do not fall within the detection capabilities of known anti-ransomware and anti-virus tools. The proposed techniques are aimed at changing the ransomware activity in the downgrading phase (encryption or obfuscation) of files on the infected system
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
Ransomware is a special type of malware, which infects a system and limits a user’s access to the sy...
Extended abstract of the PhD Thesis presented at the Doctoral Symposium associated with the 14th Int...
Táto práca sa snaží navrhnúť, implementovať a poukázať na nové techniky obfuskácie činnosti ransomvé...
Ransomware consists of malicious codes that restrict users from accessing their own files while dema...
Cybersecurity is the biggest threat in the world. More and more people are used to storing personal ...
Data Loss Prevention is a technique that allows to identify, monitor, and protect data in motion, in...
We look at the use of cryptography to obfuscate malware. Most surveys on malware obfuscation only di...
This study investigated the utilization of memory forensics and the Large Language Model LLaMA-7B fo...
Ransomware is similar to cyclone that creates data instability. The securely holded user data will b...
The threat of ransomware that encrypts data on a device and asks for payment to decrypt the data aff...
Much like their biological counterparts, digital computer viruses have existed since the inception o...
Ransomware is a malware category that exploits security mechanisms such as cryptography in order to ...
This thesis researches different ransomwares, how we can stop them and how their threat vectors work...
There are three approaches taken to analyze defenses against ransomware: signature based patterns, ...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
Ransomware is a special type of malware, which infects a system and limits a user’s access to the sy...
Extended abstract of the PhD Thesis presented at the Doctoral Symposium associated with the 14th Int...
Táto práca sa snaží navrhnúť, implementovať a poukázať na nové techniky obfuskácie činnosti ransomvé...
Ransomware consists of malicious codes that restrict users from accessing their own files while dema...
Cybersecurity is the biggest threat in the world. More and more people are used to storing personal ...
Data Loss Prevention is a technique that allows to identify, monitor, and protect data in motion, in...
We look at the use of cryptography to obfuscate malware. Most surveys on malware obfuscation only di...
This study investigated the utilization of memory forensics and the Large Language Model LLaMA-7B fo...
Ransomware is similar to cyclone that creates data instability. The securely holded user data will b...
The threat of ransomware that encrypts data on a device and asks for payment to decrypt the data aff...
Much like their biological counterparts, digital computer viruses have existed since the inception o...
Ransomware is a malware category that exploits security mechanisms such as cryptography in order to ...
This thesis researches different ransomwares, how we can stop them and how their threat vectors work...
There are three approaches taken to analyze defenses against ransomware: signature based patterns, ...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
Ransomware is a special type of malware, which infects a system and limits a user’s access to the sy...
Extended abstract of the PhD Thesis presented at the Doctoral Symposium associated with the 14th Int...