z-logo
open-access-imgOpen Access
Ethical Hacking Implementation for Lime Worm Ransomware Detection
Author(s) -
Nagham A Sultan,
Karam H. Thanoon,
Omar Adel Ibrahim
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1530/1/012078
Subject(s) - ransomware , lime , hacker , computer science , key (lock) , computer security , malware , biology , paleontology
Nowadays, computer worms become one of the most dangerous types of malwares threats. Computer worms have evolved during the time with sophisticated forms such as crypto type ransomware. Lime worm is one of these worm kinds. The researchers apply this worm on real environment in lab (ethically and for education purposes) and this paper presents the capabilities of this worm. This paper also presents static analysis by applying many tools, which are used to obtain the key information of lime worm. This paper discovers that applying static analysis on this type of worms is very effective and accurate. The obtained key information are used to develop a software for detecting lime worm and the ability to erase it.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here