Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ko, Ju Seong | - |
dc.contributor.author | Jo, Jeong Seok | - |
dc.contributor.author | Kim, Deuk Hun | - |
dc.contributor.author | Choi, Seul Ki | - |
dc.contributor.author | Kwak, Jin | - |
dc.date.issued | 2019-05-03 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36494 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85065871502&origin=inward | - |
dc.description.abstract | Recently, damage caused by ransomware has been increasing in PC and Android environments. There are many studies into real-time ransomware detection because the most important time to prevent encryption is before ransomware is able to execute its malicious process. Traditional analyses determine an application is ransomware or not by static/dynamic methods. Those analyses can serve as components of a method to detect ransomware in real time. However, problems can occur such as the inability to detect new/variant/unknown ransomware. These types require signed patches from a trusted party that can only be created after attacks occur. In a previous study into realtime new/variant/unknown ransomware detection in a PC environment, important files are monitored and only programs that have been previously analyzed and evaluated as nonmalicious are allowed. As such, programs that have not been analyzed are restricted from accessing important files. In an Android environment, this method can be applied using Android applications to prevent emerging threats and verify consistency with user intent. Thus, this paper proposes a method of detecting new/variant/unknown ransomware in real time in an Android environment. | - |
dc.description.sponsorship | ACKNOWLEDGMENT This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. NRF-2017R1E1A1A01075110). | - |
dc.language.iso | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.subject.mesh | Android | - |
dc.subject.mesh | Android applications | - |
dc.subject.mesh | Real time | - |
dc.subject.mesh | Real-time detection | - |
dc.subject.mesh | Trusted party | - |
dc.title | Real time android ransomware detection by analyzed android applications | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2019.1.22. ~ 2019.1.25. | - |
dc.citation.conferenceName | 18th International Conference on Electronics, Information, and Communication, ICEIC 2019 | - |
dc.citation.edition | ICEIC 2019 - International Conference on Electronics, Information, and Communication | - |
dc.citation.title | ICEIC 2019 - International Conference on Electronics, Information, and Communication | - |
dc.identifier.bibliographicCitation | ICEIC 2019 - International Conference on Electronics, Information, and Communication | - |
dc.identifier.doi | 10.23919/elinfocom.2019.8706349 | - |
dc.identifier.scopusid | 2-s2.0-85065871502 | - |
dc.identifier.url | http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8698536 | - |
dc.subject.keyword | Android | - |
dc.subject.keyword | Encryption | - |
dc.subject.keyword | New/Variant/Unknown Ransomware | - |
dc.subject.keyword | Real-Time Detection | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Control and Systems Engineering | - |
dc.subject.subarea | Electrical and Electronic Engineering | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.