About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Proceedings of the 7th MEC Student Research Conference on Artificial Intelligence and Cyber Security, MECSRC 2025, 01 May 2025, Muscat, Oman

Research Article

Ransomware attacks and countermeasures by secure programming

Download15 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.1-5-2025.2361392,
        author={Mohamed  Madi and Dil  Hakro and Amani  Al Hilali and Mohammed  Izaan Kari},
        title={Ransomware attacks and countermeasures by secure programming},
        proceedings={Proceedings of the 7th MEC Student Research Conference on Artificial Intelligence and Cyber Security, MECSRC 2025, 01 May 2025, Muscat, Oman},
        publisher={EAI},
        proceedings_a={MECSRC},
        year={2026},
        month={3},
        keywords={ransomware attacks security phishing attacks misconfiguration},
        doi={10.4108/eai.1-5-2025.2361392}
    }
    
  • Mohamed Madi
    Dil Hakro
    Amani Al Hilali
    Mohammed Izaan Kari
    Year: 2026
    Ransomware attacks and countermeasures by secure programming
    MECSRC
    EAI
    DOI: 10.4108/eai.1-5-2025.2361392
Mohamed Madi1, Dil Hakro1,*, Amani Al Hilali1, Mohammed Izaan Kari1
  • 1: Middle East College, Muscat, Oman
*Contact email: dhakro@mec.edu.om

Abstract

Ransomware has become one of the most damaging forms of cybercrime, encrypting data and demanding payment often in cryptocurrency to restore access. These attacks cause financial loss, data breaches, reputational harm, and operational disruption. This research highlights how secure programming practices can prevent such incidents by eliminating vulnerabilities arising from weak input validation, insecure authentication, and poor error handling. It emphasizes the role of secure coding frameworks like OWASP Secure Coding Practices, memory-safe programming languages, and cryptographic best practices in developing resilient software. The study also analyzes real-world ransomware cases, identifying key attack vectors such as phishing, malicious attachments, and drive-by downloads. Furthermore, it explores how adopting a secure software development lifecycle (SDLC) including threat modeling, code review, penetration testing, and continuous monitoring can proactively detect and mitigate flaws. Overall, secure programming forms a crucial defense layer against ransomware and strengthens cybersecurity resilience.

Keywords
ransomware attacks, security, phishing attacks, misconfiguration
Published
2026-03-18
Publisher
EAI
http://dx.doi.org/10.4108/eai.1-5-2025.2361392
Copyright © 2025–2026 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL