A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms
暂无分享,去创建一个
Routa Moussaileb | Nora Cuppens-Boulahia | Jean-Louis Lanet | Hélène Le Bouder | Jean-Louis Lanet | N. Cuppens-Boulahia | Routa Moussaileb
[1] Pearl Brereton,et al. Performing systematic literature reviews in software engineering , 2006, ICSE.
[2] George Danezis,et al. A pact with the devil , 2006, NSPW '06.
[3] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[4] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[5] Roksana Boreli,et al. On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[6] Liping Han,et al. Distance Weighted Cosine Similarity Measure for Text Classification , 2013, IDEAL.
[7] Stefano Zanero,et al. BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.
[8] Ping Chen,et al. A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.
[9] Seungyeop Han,et al. TaintDroid , 2010, OSDI.
[10] Krzysztof Cabaj,et al. Network activity analysis of CryptoWall ransomware , 2015 .
[11] Stefano Zanero,et al. HelDroid: Dissecting and Detecting Mobile Ransomware , 2015, RAID.
[12] Mohammad Mehdi Ahmadian,et al. Connection-monitor & connection-breaker: A novel approach for prevention and detection of high survivable ransomwares , 2015, 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).
[13] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[14] Chris Moore,et al. Detecting Ransomware with Honeypot Techniques , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).
[15] Jean-Marc Robert,et al. An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems , 2016, CANS.
[16] Alessandro Barenghi,et al. ShieldFS: a self-healing, ransomware-aware filesystem , 2016, ACSAC.
[17] Vinay Avasthi,et al. Ransomware Digital Extortion: A Rising New Age Threat , 2016 .
[18] Patrick Traynor,et al. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[19] Sherali Zeadally,et al. A Taxonomy of Domain-Generation Algorithms , 2016, IEEE Security & Privacy.
[20] Daniele Sgandurra,et al. Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection , 2016, ArXiv.
[21] Eric Järpe,et al. A novel method for recovery from Crypto Ransomware infections , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[22] Antonella Santone,et al. Ransomware Steals Your Phone. Formal Methods Rescue It , 2016, FORTE.
[23] Sachin Lodha,et al. POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat , 2016, CCS.
[24] Tseng Aragorn,et al. Deep Learning for Ransomware Detection , 2016 .
[25] Engin Kirda,et al. UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) , 2016, SANER.
[26] Jean-Louis Lanet,et al. Ransomware and the Legacy Crypto API , 2016, CRiSIS.
[27] Jinwoo Lee,et al. How to Make Efficient Decoy Files for Ransomware Detection? , 2017, RACS.
[28] Hongsong Chen,et al. Reasoning crypto ransomware infection vectors with Bayesian networks , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).
[29] P. Raunak,et al. Network detection of ransomware delivered by exploit kit , 2017 .
[30] Jean-Louis Lanet,et al. Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure , 2017, NordSec.
[31] S. S. Ganorkar,et al. Understanding and defending crypto-ransomware , 2017 .
[32] Ali A. Ghorbani,et al. DNA-Droid: A Real-Time Android Ransomware Detection Framework , 2017, NSS.
[33] Hiroki Kuzuno,et al. Blockchain explorer: An analytical process and investigation environment for bitcoin , 2017, 2017 APWG Symposium on Electronic Crime Research (eCrime).
[34] K. P. Soman,et al. Evaluating shallow and deep networks for ransomware detection and classification , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[35] Prabaharan Poornachandran,et al. Deep learning LSTM based ransomware detection , 2017, 2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE).
[36] Fabio Martinelli,et al. R-PackDroid: API package-based characterization and detection of mobile ransomware , 2017, SAC.
[37] Kanwalinderjit K Gagneja. Knowing the ransomware and building defense against it - specific to healthcare institutes , 2017, 2017 Third International Conference on Mobile and Secure Services (MobiSecServ).
[38] D. Nieuwenhuizen. A behavioural-based approach to ransomware detection , 2017 .
[39] Gianluca Stringhini,et al. PayBreak: Defense Against Cryptographic Ransomware , 2017, AsiaCCS.
[40] Karim Ganame,et al. Network Behavioral Analysis for Zero-Day Malware Detection - A Case Study , 2017, ISDDC.
[41] Bander Ali Saleh Al-rimy,et al. A 0-Day Aware Crypto-Ransomware Early Behavioral Detection Framework , 2017 .
[42] Sung-Ryul Kim,et al. Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph , 2017, RACS.
[43] Jack F. Bravo-Torres,et al. Social engineering as an attack vector for ransomware , 2017, 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON).
[44] Aderemi A. Atayero,et al. Ransomware: Current Trend, Challenges, and Research Directions , 2017 .
[45] Miroslaw Malek,et al. Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection , 2017, FPS.
[46] Mumbi Chishimba,et al. Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security , 2017 .
[47] Sarfraz N. Brohi,et al. A Conceptual Security Approach with Awareness Strategy and Implementation Policy to Eliminate Ransomware , 2017, CSAI 2017.
[48] Toshima Singh Rajput. Evolving Threat Agents: Ransomware and their Variants , 2017 .
[49] Toshima Singh. Evolving Threat Agents: Ransomware and their Variants , 2017 .
[50] Kyungroul Lee,et al. Ransomware prevention technique using key backup , 2018, Concurr. Comput. Pract. Exp..
[51] Hongsong Chen,et al. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems , 2018, ICT Express.
[52] Debdeep Mukhopadhyay,et al. RAPPER: Ransomware Prevention via Performance Counters , 2018, ArXiv.
[53] Damon McCoy,et al. Tracking Ransomware End-to-end , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[54] Nashwa Abdelbaki,et al. A New Static-Based Framework for Ransomware Detection , 2018, 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[55] Nileshkumar Kakade,et al. JAVA Based Honeypot: Intrusion Detection System , 2018 .
[56] Ali Dehghantanha,et al. Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection , 2018, ArXiv.
[57] Vinay J. Ribeiro,et al. RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).
[58] Zihan Wang,et al. RansomTracer: Exploiting Cyber Deception for Ransomware Tracing , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[59] Satoshi Fukumoto,et al. Detecting Ransomware using Support Vector Machines , 2018, ICPP Workshops.
[60] Gabriele Lenzini,et al. Next Generation Cryptographic Ransomware , 2018, NordSec.
[61] Wojciech Mazurczyk,et al. Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics , 2016, Comput. Electr. Eng..
[62] Anup Girdhar,et al. Behavioural Analysis of Recent Ransomwares and Prediction of Future Attacks by Polymorphic and Metamorphic Ransomware , 2018, Advances in Intelligent Systems and Computing.
[63] Aditya Tandon,et al. A Comprehensive Survey on Ransomware Attack: A Growing Havoc Cyberthreat , 2018, Data Management, Analytics and Innovation.
[64] Elisa Bertino,et al. RWGuard: A Real-Time Detection System Against Cryptographic Ransomware , 2018, RAID.
[65] Sherali Zeadally,et al. Ransomware behavioural analysis on windows platforms , 2018, J. Inf. Secur. Appl..
[66] Ravikiran Vatrapu,et al. Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning , 2018, HICSS.
[67] Oliver Michel,et al. Machine Learning-Based Detection of Ransomware Using SDN , 2018, SDN-NFV@CODASPY.
[68] Marianne A. Azer,et al. Intrusion and ransomware detection system , 2018, 2018 1st International Conference on Computer Applications & Information Security (ICCAIS).
[69] Routa Moussaileb,et al. Ransomware's Early Mitigation Mechanisms , 2018, ARES.
[70] Bander Ali Saleh Al-rimy,et al. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions , 2018, Comput. Secur..
[71] Gabriele Lenzini,et al. No Random, No Ransom: A Key to Stop Cryptographic Ransomware , 2018, DIMVA.
[72] Muhammet Baykara,et al. A novel approach to ransomware: Designing a safe zone system , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).
[73] Yuli Adam Prasetyo,et al. Zero-Day Aware Decision Fusion-Based Model for Crypto-Ransomware Early Detection , 2018, International Journal of Integrated Engineering.
[74] Ali Dehghantanha,et al. Detecting crypto-ransomware in IoT networks based on energy consumption footprint , 2018, J. Ambient Intell. Humaniz. Comput..
[75] Dipankar Dasgupta,et al. Forensic Analysis of Ransomware Families Using Static and Dynamic Analysis , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[76] Vimal Kumar,et al. Behaviour Based Ransomware Detection , 2019, CATA.
[77] Jack W. Stokes,et al. Attention in Recurrent Neural Networks for Ransomware Detection , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[78] Nitin Naik,et al. Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering , 2019, 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[79] Nitin Naik,et al. Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules , 2019, 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[80] Kangbin Yim,et al. Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems , 2019, IEEE Access.
[81] Murat Kantarcioglu,et al. BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain , 2019, ArXiv.
[82] Md. Zakirul Alam Bhuiyan,et al. Ransomware Attack Protection: A Cryptographic Approach , 2019, SpaCCS.
[83] Daniele Sgandurra,et al. On Deception-Based Protection Against Cryptographic Ransomware , 2019, DIMVA.
[84] Sakir Sezer,et al. A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware , 2019, IEEE Access.
[85] Routa Moussaileb,et al. Ransomware Network Traffic Analysis for Pre-encryption Alert , 2019, FPS.
[86] Da-Yu KAO,et al. Analyzing WannaCry Ransomware Considering the Weapons and Exploits , 2019, 2019 21st International Conference on Advanced Communication Technology (ICACT).
[87] Jasmine Norman,et al. A Review and Analysis of Ransomware Using Memory Forensics and Its Tools , 2020 .
[88] Bander Ali Saleh Al-rimy,et al. Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection , 2019, Future Gener. Comput. Syst..
[89] Vassilios G. Vassilakis,et al. Ransomware detection and mitigation using software-defined networking: The case of WannaCry , 2019, Comput. Electr. Eng..
[90] Huy Kang Kim,et al. Ransomware protection using the moving target defense perspective , 2019, Comput. Electr. Eng..
[91] Sergiu Sechel. A Comparative Assessment of Obfuscated Ransomware Detection Methods , 2019 .
[92] Vassilios G. Vassilakis,et al. WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms , 2019, Journal of Telecommunications and Information Technology.
[93] Syed Rameem Zahra,et al. RansomWare and Internet of Things: A New Security Nightmare , 2019, 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
[94] Daniel Morato,et al. A Survey on Detection Techniques for Cryptographic Ransomware , 2019, IEEE Access.
[95] Zhenhua Duan,et al. FastDroid: Efficient Taint Analysis for Android Applications , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion).
[96] Budi Arief,et al. Why Current Statistical Approaches to Ransomware Detection Fail , 2020, ISC.
[97] Isredza Rahmi A. Hamid,et al. Android Ransomware Detection Based on Dynamic Obtained Features , 2020, SCDM.
[98] Dusko Pavlovic,et al. Dynamic Distributed Secure Storage Against Ransomware , 2020, IEEE Transactions on Computational Social Systems.
[99] Huirong Fu,et al. Ransomware in Windows and Android Platforms , 2020, ArXiv.
[100] Manisha Kaushik,et al. Android Ransomware and Its Detection Methods , 2020 .
[101] Ali Dehghantanha,et al. Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence , 2018, IEEE Transactions on Emerging Topics in Computing.
[102] Edgar O. Osaghae. Classifying Packed Programs as Malicious Software Detected , .