2023
DOI: 10.20944/preprints202311.0798.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Survey on Ransomware Threats: Contrasting Static and Dynamic Analysis Methods

Qian Kang,
Yuanyuan Gu

Abstract: The proliferation of ransomware poses a significant threat to global cybersecurity. This study presents a comprehensive review of the methodologies employed in the detection and analysis of ransomware, emphasizing the dichotomy between static and dynamic analysis approaches. It introduces the historical context and the necessity for robust cybersecurity measures, followed by an outline of the methodological framework used to evaluate existing ransomware analysis techniques. The results detail the effectiveness… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(18 citation statements)
references
References 79 publications
0
15
0
Order By: Relevance
“…Researchers have observed a trend in the evolution of ransomware tactics from basic lockers to more sophisticated encryption-based methods [26,27]. Newer ransomware variants are increasingly incorporating tactics to evade detection by security software [28]. The diversity in Android device models and OS versions also contributed to the challenge of securing all devices uniformly [29].…”
Section: Ransomware On Androidmentioning
confidence: 99%
See 3 more Smart Citations
“…Researchers have observed a trend in the evolution of ransomware tactics from basic lockers to more sophisticated encryption-based methods [26,27]. Newer ransomware variants are increasingly incorporating tactics to evade detection by security software [28]. The diversity in Android device models and OS versions also contributed to the challenge of securing all devices uniformly [29].…”
Section: Ransomware On Androidmentioning
confidence: 99%
“…Research has always advocated for a multi-layered security approach to effectively mitigate ransomware threats on mobile devices [30,28,31]. Traditional antivirus solutions have been found somewhat effective but insufficient alone due to the dynamic nature of ransomware attacks [13,32,33].…”
Section: Mitigation Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…This exponential rise highlights not only the growing sophistication of ransomware attacks but also their expanding scope, targeting entities ranging from individual users to large corporations and government agencies [3]. The evolution of ransomware from relatively simple locker malware, which restricts access to the system or files without encrypting them, to highly sophisticated, self-propagating threats that exploit network vulnerabilities, signifies a shift in the threat landscape [3,1,4]. Modern ransomware variants, such as Wan-naCry and NotPetya, have demonstrated the capability to cause widespread disruption by leveraging encryption algorithms and propagation techniques that exploit flaws in network protocols, and have underscored the vulnerability of critical infrastructure and essential services to cyber extortion, leading to heightened scrutiny of cybersecurity defenses [2].…”
Section: Introductionmentioning
confidence: 99%