Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration

T McIntosh, T Susnjak, T Liu, D Xu, P Watters… - ACM Computing …, 2024 - dl.acm.org
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …

A comprehensive survey on deep learning based malware detection techniques

M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …

Ransomware: Recent advances, analysis, challenges and future research directions

C Beaman, A Barkworth, TD Akande, S Hakak… - Computers & …, 2021 - Elsevier
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks.
Different institutions such as healthcare, financial, and government have been targeted …

Evaluating large language models in ransomware negotiation: A comparative analysis of chatgpt and claude

T Kumamoto, Y Yoshida, H Fujima - 2023 - researchsquare.com
This study presents a comprehensive analysis of the application of Large Language Models
(LLMs), specifically ChatGPT and Claude, in the context of ransomware negotiation …

Entropy and memory forensics in ransomware analysis: Utilizing llama-7b for advanced pattern recognition

W Zhang, X Li, T Zhu - Authorea Preprints, 2023 - techrxiv.org
This study investigated the utilization of memory forensics and the Large Language Model
LLaMA-7B for the purpose of detecting and analyzing contemporary ransomware. It …

Ransomcillin: Leveraging ntfs spare space to recover from ransomware attacks

K Takeuchi, H Fujima, T Kumamoto, Y Yoshida - 2023 - researchsquare.com
This study investigates an innovative method to combat ransomware, leveraging the New
Technology File System (NTFS) spare space in Windows operating systems. The focus is on …

The age of ransomware: A survey on the evolution, taxonomy, and research directions

S Razaulla, C Fachkha, C Markarian… - IEEE …, 2023 - ieeexplore.ieee.org
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …

Decentralized identity verification system for data access to prevent data exfiltration ransomware

K Takeuchi, T Kumamoto, Y Yoshida, H Fujima - Authorea Preprints, 2023 - techrxiv.org
The escalating sophistication of ransomware has catalyzed the transition from traditional
encryption-focused attacks to more pernicious data exfiltration techniques. This research …

Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions

T McIntosh, ASM Kayes, YPP Chen, A Ng… - ACM Computing …, 2021 - dl.acm.org
Although ransomware has been around since the early days of personal computers, its
sophistication and aggression have increased substantially over the years. Ransomware, as …

A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …