This HTML5 document contains 30 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n21https://kar.kent.ac.uk/69882/
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
wdrshttp://www.w3.org/2007/05/powder-s#
n14http://purl.org/ontology/bibo/status/
dchttp://purl.org/dc/elements/1.1/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n18https://kar.kent.ac.uk/id/subject/
n13https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n9doi:10.1109/
n4http://eprints.org/ontology/
bibohttp://purl.org/ontology/bibo/
n15https://kar.kent.ac.uk/id/publication/
n19https://kar.kent.ac.uk/id/org/
n16https://kar.kent.ac.uk/id/eprint/69882#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n5https://kar.kent.ac.uk/id/document/
n11https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n17https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n7https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:69882
rdf:type
bibo:Article n4:EPrint n4:ArticleEPrint bibo:AcademicArticle
rdfs:seeAlso
n21:
owl:sameAs
n9:ACCESS.2018.2873583
n4:hasDocument
n5:3164252 n5:3164253 n5:3164254 n5:3164255 n5:3140627 n5:3140616
n4:hasPublished
n5:3140616
dc:hasVersion
n5:3140616
dcterms:title
An in-Depth Study of the Jisut Family of Android Ransomware
wdrs:describedby
n13:export_kar_RDFN3.n3 n17:export_kar_RDFN3.n3
dcterms:date
2018-10-04
dcterms:creator
n7:ext-j.c.hernandez-castro@kent.ac.uk n7:ext-3ab2f6304b66b6d971b41c3464820bc1 n7:ext-5311d85fc25cb403b47a5f2a07ab0473
bibo:status
n14:peerReviewed n14:published
dcterms:publisher
n19:ext-af0a9a5baed87c407844a3f5db44597c
bibo:abstract
Android malware is increasing in spread and complexity. Advanced obfuscation, emulation detection, delayed payload activation or dynamic code loading are some of the techniques employed by the current malware to hinder the use of reverse engineering techniques and anti-malware tools. This growing complexity is particularly noticeable in the evolution of different strands of the same malware family. Over the years, these families mature to become more effective by incorporating new and enhanced techniques. In this paper, we focus on a particular Android ransomware family named Jisut, and perform a thorough technical analysis. We also provide a detailed overall perspective, which will hopefully help to create new tools and techniques to tackle more effectively the threat posed by ransomware.
dcterms:isPartOf
n11:repository n15:ext-21693536
dcterms:subject
n18:QA76
bibo:authorList
n16:authors
bibo:volume
6