[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kamal et al., 2021 - Google Patents

A User-friendly Model for Ransomware Analysis Using Sandboxing.

Kamal et al., 2021

View PDF
Document ID
2730381739737523398
Author
Kamal A
Derbali M
Jan S
Bangash J
Khan F
Jerbi H
Abbassi R
Ahmad G
Publication year
Publication venue
Computers, Materials & Continua

External Links

Snippet

Ransomware is a type of malicious software that blocks access to a computer by encrypting user's files until a ransom is paid to the attacker. There have been several reported high- profile ransomware attacks including WannaCry, Petya, and Bad Rabbit resulting in losses …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0354Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

Similar Documents

Publication Publication Date Title
McIntosh et al. Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
Moussaileb et al. A survey on windows-based ransomware taxonomy and detection mechanisms
Subedi et al. Forensic analysis of ransomware families using static and dynamic analysis
Alazab et al. Cybercrime: the case of obfuscated malware
Alswaina et al. Android malware permission-based multi-class classification using extremely randomized trees
Vidyarthi et al. Static malware analysis to identify ransomware properties
Rani et al. Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art
AlSabeh et al. Exploiting ransomware paranoia for execution prevention
Chayal et al. A review on spreading and forensics analysis of windows-based ransomware
Kamal et al. A User-friendly Model for Ransomware Analysis Using Sandboxing.
Yamany et al. Salam ransomware behavior analysis challenges and decryption
Aminuddin et al. Android trojan detection based on dynamic analysis
Singh et al. It's too late if exfiltrate: Early stage Android ransomware detection
Malik et al. Critical feature selection for machine learning approaches to detect ransomware
BELEA Methods for detecting malware using static, dynamic and hybrid analysis
Chowdhury et al. Malware detection for healthcare data security
Ali et al. Static analysis of malware in android-based platforms: a progress study
Anand et al. Comparative study of ransomwares
Yadav et al. A complete study on malware types and detecting ransomware using API calls
Ferdous et al. Malware resistant data protection in hyper-connected networks: A survey
Vidyarthi et al. Identifying ransomware-specific properties using static analysis of executables
Tari et al. Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-based Data Security
Ismael et al. Investigation Malware Analysis Depend on Reverse Engineering Using IDAPro
Azahari et al. ANDROID DESIGNED MALWARE DETECTION CHALLENGES: A FUTURE RESEARCH DIRECTION
Fraley Improved detection for advanced polymorphic malware