Mostrar el registro sencillo del ítem

dc.contributor.authorGranado-Masid, Ander
dc.contributor.authorBermejo-Higuera, Javier
dc.contributor.authorBermejo Higuera, Juan Ramón
dc.contributor.authorSicilia, Juan Antonio
dc.date2023
dc.date.accessioned2023-04-13T07:16:46Z
dc.date.available2023-04-13T07:16:46Z
dc.identifier.citationMasid, A.G., Higuera, J.B., Higuera, JR.B. et al. Application of the SAMA methodology to Ryuk malware. J Comput Virol Hack Tech (2022). https://doi.org/10.1007/s11416-022-00434-1es_ES
dc.identifier.issn2263-8733
dc.identifier.urihttps://reunir.unir.net/handle/123456789/14520
dc.description.abstractMalware analysis is an essential discipline for understanding the nature, attack vectors, and weaknesses of systems to combat the threats that emerge every day in the IT security world. To this end, a malware analysis methodology can facilitate and improve an otherwise complex, chaotic, and relatively inefficient process, optimising the results obtained and the productivity of the analysis. To prove the effectiveness of a malware analysis methodology, it is necessary to test it on relevant specimens. The aim of this paper is, on one hand, to test and demonstrate the value of the SAMA methodology as a systematic process for analysing malware with a real and significant use case and, on the other hand, to show, explain and put into practice several actual malware analysis techniques and tools using a real and relevant use case. The analysis process carried out with the methodology shows its ability to guide a malware analysis process as well as its flexibility to adapt the techniques according to the findings obtained during the process.es_ES
dc.language.isoenges_ES
dc.publisherJournal of Computer Virology and Hacking Techniqueses_ES
dc.relation.ispartofseries;vol. 19, nº 2
dc.relation.urihttps://link.springer.com/article/10.1007/s11416-022-00434-1#citeases_ES
dc.rightsrestrictedAccesses_ES
dc.subjectbehavioural analysises_ES
dc.subjectcode analysises_ES
dc.subjectmalware analysises_ES
dc.subjectransomwarees_ES
dc.subjectRyukes_ES
dc.subjectsandboxes_ES
dc.subjectScopuses_ES
dc.subjectEmerginges_ES
dc.titleApplication of the SAMA methodology to Ryuk malwarees_ES
dc.typeArticulo Revista Indexadaes_ES
reunir.tag~ARIes_ES
dc.identifier.doihttps://doi.org/10.1007/s11416-022-00434-1


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem