Mostrar el registro sencillo del ítem
Application of the SAMA methodology to Ryuk malware
dc.contributor.author | Granado-Masid, Ander | |
dc.contributor.author | Bermejo-Higuera, Javier | |
dc.contributor.author | Bermejo Higuera, Juan Ramón | |
dc.contributor.author | Sicilia, Juan Antonio | |
dc.date | 2023 | |
dc.date.accessioned | 2023-04-13T07:16:46Z | |
dc.date.available | 2023-04-13T07:16:46Z | |
dc.identifier.citation | Masid, A.G., Higuera, J.B., Higuera, JR.B. et al. Application of the SAMA methodology to Ryuk malware. J Comput Virol Hack Tech (2022). https://doi.org/10.1007/s11416-022-00434-1 | es_ES |
dc.identifier.issn | 2263-8733 | |
dc.identifier.uri | https://reunir.unir.net/handle/123456789/14520 | |
dc.description.abstract | Malware analysis is an essential discipline for understanding the nature, attack vectors, and weaknesses of systems to combat the threats that emerge every day in the IT security world. To this end, a malware analysis methodology can facilitate and improve an otherwise complex, chaotic, and relatively inefficient process, optimising the results obtained and the productivity of the analysis. To prove the effectiveness of a malware analysis methodology, it is necessary to test it on relevant specimens. The aim of this paper is, on one hand, to test and demonstrate the value of the SAMA methodology as a systematic process for analysing malware with a real and significant use case and, on the other hand, to show, explain and put into practice several actual malware analysis techniques and tools using a real and relevant use case. The analysis process carried out with the methodology shows its ability to guide a malware analysis process as well as its flexibility to adapt the techniques according to the findings obtained during the process. | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | Journal of Computer Virology and Hacking Techniques | es_ES |
dc.relation.ispartofseries | ;vol. 19, nº 2 | |
dc.relation.uri | https://link.springer.com/article/10.1007/s11416-022-00434-1#citeas | es_ES |
dc.rights | restrictedAccess | es_ES |
dc.subject | behavioural analysis | es_ES |
dc.subject | code analysis | es_ES |
dc.subject | malware analysis | es_ES |
dc.subject | ransomware | es_ES |
dc.subject | Ryuk | es_ES |
dc.subject | sandbox | es_ES |
dc.subject | Scopus | es_ES |
dc.subject | Emerging | es_ES |
dc.title | Application of the SAMA methodology to Ryuk malware | es_ES |
dc.type | Articulo Revista Indexada | es_ES |
reunir.tag | ~ARI | es_ES |
dc.identifier.doi | https://doi.org/10.1007/s11416-022-00434-1 |
Ficheros en el ítem
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |