Martin, Alejandro, Hernandez-Castro, Julio C., Camacho, David (2018) An in-Depth Study of the Jisut Family of Android Ransomware. IEEE Access, 6 . pp. 57205-57218. ISSN 2169-3536. (doi:10.1109/ACCESS.2018.2873583) (KAR id:69882)
PDF
Publisher pdf
Language: English |
|
Download this file (PDF/2MB) |
Preview |
Request a format suitable for use with assistive technology e.g. a screenreader | |
Official URL: https://doi.org/10.1109/ACCESS.2018.2873583 |
Abstract
Android malware is increasing in spread and complexity. Advanced obfuscation, emulation detection, delayed payload activation or dynamic code loading are some of the techniques employed by the current malware to hinder the use of reverse engineering techniques and anti-malware tools. This growing complexity is particularly noticeable in the evolution of different strands of the same malware family. Over the years, these families mature to become more effective by incorporating new and enhanced techniques. In this paper, we focus on a particular Android ransomware family named Jisut, and perform a thorough technical analysis. We also provide a detailed overall perspective, which will hopefully help to create new tools and techniques to tackle more effectively the threat posed by ransomware.
Item Type: | Article |
---|---|
DOI/Identification number: | 10.1109/ACCESS.2018.2873583 |
Uncontrolled keywords: | Ransomware, Jisut, android, malware, malware families |
Subjects: | Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming, |
Divisions: | Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing |
Depositing User: | Julio Hernandez Castro |
Date Deposited: | 01 Nov 2018 15:27 UTC |
Last Modified: | 05 Nov 2024 12:32 UTC |
Resource URI: | https://kar.kent.ac.uk/id/eprint/69882 (The current URI for this page, for reference purposes) |
- Link to SensusAccess
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):