Kamal et al., 2021 - Google Patents
A User-friendly Model for Ransomware Analysis Using Sandboxing.Kamal et al., 2021
View PDF- Document ID
- 2730381739737523398
- Author
- Kamal A
- Derbali M
- Jan S
- Bangash J
- Khan F
- Jerbi H
- Abbassi R
- Ahmad G
- Publication year
- Publication venue
- Computers, Materials & Continua
External Links
Snippet
Ransomware is a type of malicious software that blocks access to a computer by encrypting user's files until a ransom is paid to the attacker. There have been several reported high- profile ransomware attacks including WannaCry, Petya, and Bad Rabbit resulting in losses …
- 238000004458 analytical method 0 title abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/033—Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
- G06F3/0354—Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/011—Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
Similar Documents
Publication | Publication Date | Title |
---|---|---|
McIntosh et al. | Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions | |
Moussaileb et al. | A survey on windows-based ransomware taxonomy and detection mechanisms | |
Subedi et al. | Forensic analysis of ransomware families using static and dynamic analysis | |
Alazab et al. | Cybercrime: the case of obfuscated malware | |
Alswaina et al. | Android malware permission-based multi-class classification using extremely randomized trees | |
Vidyarthi et al. | Static malware analysis to identify ransomware properties | |
Rani et al. | Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art | |
AlSabeh et al. | Exploiting ransomware paranoia for execution prevention | |
Chayal et al. | A review on spreading and forensics analysis of windows-based ransomware | |
Kamal et al. | A User-friendly Model for Ransomware Analysis Using Sandboxing. | |
Yamany et al. | Salam ransomware behavior analysis challenges and decryption | |
Aminuddin et al. | Android trojan detection based on dynamic analysis | |
Singh et al. | It's too late if exfiltrate: Early stage Android ransomware detection | |
Malik et al. | Critical feature selection for machine learning approaches to detect ransomware | |
BELEA | Methods for detecting malware using static, dynamic and hybrid analysis | |
Chowdhury et al. | Malware detection for healthcare data security | |
Ali et al. | Static analysis of malware in android-based platforms: a progress study | |
Anand et al. | Comparative study of ransomwares | |
Yadav et al. | A complete study on malware types and detecting ransomware using API calls | |
Ferdous et al. | Malware resistant data protection in hyper-connected networks: A survey | |
Vidyarthi et al. | Identifying ransomware-specific properties using static analysis of executables | |
Tari et al. | Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-based Data Security | |
Ismael et al. | Investigation Malware Analysis Depend on Reverse Engineering Using IDAPro | |
Azahari et al. | ANDROID DESIGNED MALWARE DETECTION CHALLENGES: A FUTURE RESEARCH DIRECTION | |
Fraley | Improved detection for advanced polymorphic malware |