A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

A survey of crypto ransomware attack detection methodologies: an evolving outlook

A Alqahtani, FT Sheldon - Sensors, 2022 - mdpi.com
Recently, ransomware attacks have been among the major threats that target a wide range
of Internet and mobile users throughout the world, especially critical cyber physical systems …

Rapid ransomware detection through side channel exploitation

MA Taylor, EC Larson… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
A new method for the detection of ransomware in an infected host is described and
evaluated. The method utilizes data streams from on-board sensors to fingerprint the …

A survey of machine learning algorithms for detecting ransomware encryption activity

E Larsen, D Noever, K MacVittie - arXiv preprint arXiv:2110.07636, 2021 - arxiv.org
A survey of machine learning techniques trained to detect ransomware is presented. This
work builds upon the efforts of Taylor et al. in using sensor-based methods that utilize data …

Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware

A Yu, J Kang, J Morris, E Bertino… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Ransomware attacks have become widespread in the last few years and have affected
many critical industries and infrastructures. Unfortunately, there are no recovery tools that …

POSSE: Patterns of Systems During Software Encryption

D Noever, SM Noever - arXiv preprint arXiv:2109.12162, 2021 - arxiv.org
This research recasts ransomware detection using performance monitoring and statistical
machine learning. The work builds a test environment with 41 input variables to label and …

Fight Virus Like a Virus: A New Defense Method Against File-Encrypting Ransomware

J Morris, D Lin, M Smith - arXiv preprint arXiv:2103.11014, 2021 - arxiv.org
Nowadays ransomware has become a new profitable form of attack. This type of malware
acts as a form of extortion which encrypts the files in a victim's computer and forces the victim …

[PDF][PDF] On ransomware detection

WZ Zakaria, MF Abdollah, AM Ariffin - Proceedings of the seventh …, 2018 - academia.edu
For the past few years, ransomware maintains to be one of the most disastrous cyber
threatsand is actively threatening IT users. Many organizations and individuals around the …

Remote Server Management Utilizing Self Contained Baseboard Management Controller

R Drury, A Mcneil, H Richardson… - US Patent App. 17 …, 2022 - Google Patents
A system includes servers, each server including a base board management controller
(BMC) and operating envi ronments including motherboards and processors. One of the …

[PDF][PDF] A Survey of Crypto-Ransomware Attacks for Health Record Systems: Security, Privacy Issues and Proposed Prior Detection Pre-Encryption Model

OS Odwar - researchgate.net
With the tremendous shifts in healthcare facilities towards digital-enabled healthcare
services and the need for computer storage corresponding to patient care (health record …