Ajou University repository

Real time android ransomware detection by analyzed android applications
  • Ko, Ju Seong ;
  • Jo, Jeong Seok ;
  • Kim, Deuk Hun ;
  • Choi, Seul Ki ;
  • Kwak, Jin
Citations

SCOPUS

0

Citation Export

Publication Year
2019-05-03
Journal
ICEIC 2019 - International Conference on Electronics, Information, and Communication
Publisher
Institute of Electrical and Electronics Engineers Inc.
Citation
ICEIC 2019 - International Conference on Electronics, Information, and Communication
Keyword
AndroidEncryptionNew/Variant/Unknown RansomwareReal-Time Detection
Mesh Keyword
AndroidAndroid applicationsReal timeReal-time detectionTrusted party
All Science Classification Codes (ASJC)
Control and Systems EngineeringElectrical and Electronic Engineering
Abstract
Recently, damage caused by ransomware has been increasing in PC and Android environments. There are many studies into real-time ransomware detection because the most important time to prevent encryption is before ransomware is able to execute its malicious process. Traditional analyses determine an application is ransomware or not by static/dynamic methods. Those analyses can serve as components of a method to detect ransomware in real time. However, problems can occur such as the inability to detect new/variant/unknown ransomware. These types require signed patches from a trusted party that can only be created after attacks occur. In a previous study into realtime new/variant/unknown ransomware detection in a PC environment, important files are monitored and only programs that have been previously analyzed and evaluated as nonmalicious are allowed. As such, programs that have not been analyzed are restricted from accessing important files. In an Android environment, this method can be applied using Android applications to prevent emerging threats and verify consistency with user intent. Thus, this paper proposes a method of detecting new/variant/unknown ransomware in real time in an Android environment.
Language
eng
URI
https://aurora.ajou.ac.kr/handle/2018.oak/36494
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85065871502&origin=inward
DOI
https://doi.org/10.23919/elinfocom.2019.8706349
Journal URL
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8698536
Type
Conference
Funding
ACKNOWLEDGMENT This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. NRF-2017R1E1A1A01075110).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.