- Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery [CCS'23]
- RøB: Ransomware over Modern Web Browsers [USENIX Security'23]
- A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions [ACM Computing Surveys'22]
- Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction [CCS'22]
- Poster: MUSTARD - Adaptive Behavioral Analysis for Ransomware Detection [CCS'22]
- Wake Up Digital Forensics’ Community and Help Combat Ransomware [IEEE Symposium on Security and Privacy'22]
- Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection [Applied Soft Computing'22]
- Peeler: Profiling Kernel-Level Events to Detect Ransomware [arXiv'21]
- BitcoinHeist: Topological Data Analysis for Ransomware Prediction on the Bitcoin Blockchain [IJCAI'20]
- Ransomware Detection techniques in the Dawn of Artificial Intelligence: A Survey[ICNCC '20]
- Ransomware protection in IoT using software defined networking [IJECE'20]
- Two Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques[Wireless Personal Communications: An International Journal Vol. 112, No. 4, '20]
- On the Effectiveness of Application Permissions for Android Ransomware Detection [CDMA'20]
- Optimizing Extreme Learning Machines Using Chains of Salps for Efficient Android Ransomware Detection [Applied Sciences 2020]
- Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network [BDIOT'19]
- Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment [MilCIS'19]
- Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments [Sensors'19]
- Multilayer ransomware detection using grouped registry key operations,fileentropy and file signature monitoring [Journal of Computer Security. 2019]
- Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection [Future Generation Computer Systems'19]
- Classification of ransomware families with machine learning based on N-gram of opcodes [Future Generation Computer Systems 90 (2019)]
- TEE-aided Write Protection Against Privileged Data Tampering [NDSS'19]
- Ransomware detection and mitigation using software-defined networking: The case of WannaCry [Computers & Electrical Engineering Volume76'19]
- RansomBlocker: a Low-Overhead Ransomware-Proof SSD [DAC'19]
- Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences [arXiv'19]
- Ransomware Detection System for Android Applications [Electronics 2019]
- Ransomware Detection Based on an Improved Double-Layer Negative Selection Algorithm [Testbeds and Research Infrastructures for the Development of Networks and Communications'19]
- On the effectiveness of system API-related information for Android ransomware detection [Computers & Security 2019]
- The Case for Native Instructions in the Detection of Mobile Ransomware [IEEE Letters of the Computer Society 2019]
- An Intelligent Behavior-Based Ransomware Detection System For Android Platform [TPS-ISA'19]
- Ransomware Detection Using Limited Precision Deep Learning Structure in FPGA [NAECON'18]
- Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection [International Symposium on Foundations and Practice of Security 2018]
- RWGuard: A Real-Time Detection System Against Cryptographic Ransomware [International Symposium on Research in Attacks, Intrusions, and Defenses. 2018]
- Zero-day aware decision fusion-based model for crypto-ransomware early detection [International Journal of Integrated Engineering'18]
- Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection [arXiv'18]
- Machine Learning-Based Detection of Ransomware Using SDN [SDN-NFV Sec'18]
- Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory [Expert Systems with Applications 2018]
- SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery [IEEE 38th International Conference on Distributed Computing Systems. 2018]
- Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware [Cyber Threat Intelligence 2018]
- A New Static-Based Framework for Ransomware Detection[DASC'18]
- The aftermath of a crypto-ransomware attack at a large academic institution [USENIX Security'18]
- Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? [IEEE Symposium on Security and Privacy'18]
- A Storage-level Detection Mechanism against Crypto-Ransomware [CCS'18]
- Tracking Ransomware End-to-end [IEEE Symposium on Security and Privacy'18]
- Ransomware Prevention usng Application Authentication-Based File Access Control [Symposium on Applied Computing SAC'18]
- Amoeba: An Autonomous Backup and Recovery SSD for Ransomware Attack Defense [IEEE Computer Architecture Letters’18]
- Detecting Ransomware using Support Vector Machines [ICPP Workshops'18]
- RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform [EIT'18]
- Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection [IEEE Transactions on Information Forensics and Security 2018]
- A Novel Structural-Entropy-based Classification Technique for Supporting Android Ransomware Detection and Analysis [FUZZ-IEEE'18]
- DNA-Droid: A Real-Time Android Ransomware Detection Framework [International Conference on Network and System Security'17]
- Detecting crypto-ransomware in IoT networks based on energy consumption footprint [Journal of Ambient Intelligence and Humanized Computing 2017]
- Android ransomware detection using reduced opcode sequence and image similarity [ICCKE'17]
- R-PackDroid: API package-based characterization and detection of mobile ransomware [SAC '17]
- Deep learning LSTM based ransomware detection [RDCAPE'17]
- Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph [RACS'17]
- Redemption: Real-Time Protection Against Ransomware at End-Hosts [International Symposium on Research in Attacks, Intrusions, and Defenses'17]
- Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure [NordSec'17]
- FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware [CCS'17]
- PayBreak: Defense Against Cryptographic Ransomware [ASIA CCS'17]
- Talos: No more ransomware victims with formal methods [International Journal of Information Security 2017]
- ShieldFS: a self-healing, ransomware-aware filesystem [ACSAC'16]
- CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data [International Conference on Distributed Computing Systems’16]
- UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware [USENIX Security'16]
- The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform [Mobile Information Systems'16]
- Ransomware Steals Your Phone. Formal Methods Rescue It [International Conference on Formal Techniques for Distributed Objects, Components, and Systems 2016]
- Certified Robustness of Static Deep Learning-based Malware Detectors against Patch and Append Attacks [AISec'23]
- AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware Corpora [AISec'23]
- Drift Forensics of Malware Classifiers [AISec'23]
- Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors [AISec'23]
- Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis [NDSS'23]
- Fusion: Efficient and Secure Inference Resilient to Malicious Servers [NDSS'23]
- Deep Learning for Zero-day Malware Detection and Classification: A Survey [ACM Computing Surveys'23]
- Humans vs. Machines in Malware Classification [USENIX Security '23]
- FCGAT: Interpretable Malware Classification Method using Function Call Graph and Attention Mechanism [NDSS'23]
- Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection [CCS'22]
- Quo Vadis: Hybrid Machine Learning Meta-Model Based on Contextual and Behavioral Malware Representations [AISec'22]
- Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes [ASIA CCS'21]
- Investigating Labelless Drift Adaptation for Malware Detection [AISec'21]
- Forecasting Malware Capabilities From Cyber Attack Memory Images [USENIX Security'21]
- When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World [USENIX Security'21]
- Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection [NDSS'21]
- DeepReflect: Discovering Malicious Functionality through Binary Reconstruction [USENIX Security'21]
- Dynamic Malware Analysis with Feature Engineering and Feature Learning [AAAI'20]
- Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Malware Analysis [AISec'20]
- Flow-based Detection and Proxy-based Evasion of Encrypted Malware C2 Traffic [AISec'20]
- You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis [NDSS'20]
- Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem [NDSS'20]
- When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features [NDSS'20]
- ExSpectre: Hiding Malware in Speculative Execution [NDSS'19]
- Classification of Malware by Using Structural Entropy on Convolutional Neural Networks [AAAI'18]
- Monotonic models for real-time dynamic malware detection [ICLR'18]
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns [Ransomware]
- Ransomware in the Bitcoin Ecosystem | Dataset Extraction [Ransomware]
- VirusTotal [Ransomware and Malware]
- OPEN REPOSITORY FOR THE EVALUATION OF RANSOMWARE DETECTION TOOLS [Ransomware]
- MalwareBazaar [Malware]
- National Vulnerability Database (NVD) [Ransomware and Malware]
- Android Ransomware Detection [Ransomware]
- Ransomware PE Header Feature Dataset [Ransomware]
- Dataset of "Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection" [Ransomware]
- Bitcoin Heist Ransomware Address Dataset [Ransomware]
- Awesome-Cybersecurity-Datasets [Ransomware and Malware]
- Ransomware PCAP repository [Ransomware]
- HelDroid [Android ransomware]
- vx-underground [APT Attack / Malware]
- DikeDataset [Malware]
- PE Malware Machine Learning Dataset [Malware]
- Malware Detection PE-Based Analysis Using Deep Learning Algorithm Dataset [Malware]
- virusshare [Malware]
- SHIELDFS [A Self-healing, Ransomware-aware Filesystem]
- Ransomware Attacks [Ransomware Datasets]
- Ransomware Dataset
- ISOT Ransomware Detection Dataset
- BODMAS Malware Dataset [Malware]
- Maldatabase (Malware)
- vizsec (Malware / APT)
- Machine Learning-Based NIDS Datasets
- DDoS Evaluation Dataset (CIC-DDoS2019) [DDoS Attack]
- MAWI Working Group Traffic Archive [Malicious Traffic]
- CSE-CIC-IDS2018 on AWS [Malicious Traffic]
- Cross Container Attacks: The Bewildered eBPF on Clouds [USENIX Security'23]
- Electrode: Accelerating Distributed Protocols with eBPF [NSDI'23]
- Fast In-kernel Traffic Sketching in eBPF [SIGCOMM'23]
- Comparing Security in eBPF and WebAssembly [eBPF'23]
- Seeing the Invisible: Auditing eBPF Programs in Hypervisor with HyperBee [eBPF'23]
- Enabling BPF Runtime policies for better BPF management [eBPF'23]
- Network Profiles for Detecting Application-Characteristic Behavior Using Linux eBPF [eBPF'23]
- RingGuard: Guard io_uring with eBPF [eBPF'23]
- Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing [eBPF'23]
- Practical and Flexible Kernel CFI Enforcement using eBPF [eBPF'23]
- Understanding the Security of Linux eBPF Subsystem [APSys'23]
- Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing [arXiv'23]
- SPRIGHT:ExtractingtheServerfromServerlessComputing! High-performanceeBPF-basedEvent-driven,Shared-memory Processing [SIGCOMM'22]
- XRP: In-Kernel Storage Functions with eBPF [OSDI'22]
- A flow-based IDS using Machine Learning in eBPF [Arxiv'22]
- BMC: Accelerating Memcached using Safe In-kernel Caching and Pre-stack Processing [NSDI'21]
- Specification and verification in the field: applying formal methods to BPF just-in-time compilers in the Linux kernel [OSDI'20]
- bpfbox: Simple Precise Process Confinement with eBPF [CCSW'20]
- Simple and precise static analysis of untrusted Linux kernel extensions [PLDI'19]
- PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary [NDSS'19]