PLAY Ransomware implements anti-analysis techniques, including call-stack obfuscation, opaque predicates, garbage code, dynamic API function pointer encryption, and user-mode API unhooking.
Select an Asset – System or Server that your opponent has in play; if RECESS SPIDER is in play, you may select an additional System or Server. The selected Assets receive no points while this card is in play. Remove 1 point per round while this card is in play. Discard this card after 2 rounds.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.