2020
DOI: 10.1109/mce.2019.2956192
|View full text |Cite
|
Sign up to set email alerts
|

Blacklist vs. Whitelist-Based Ransomware Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…(2018) ; Genç et al. (2018) ; Kim and Lee (2020) ; McIntosh et al. (2021) ; Parkinson (2017) Data Backup Continella et al.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…(2018) ; Genç et al. (2018) ; Kim and Lee (2020) ; McIntosh et al. (2021) ; Parkinson (2017) Data Backup Continella et al.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Kim and Lee Kim and Lee (2020) proposed an access control list that whitelists specific programs for each file type. Only whitelisted programs are allowed to access files.…”
Section: Literature Reviewmentioning
confidence: 99%
“…He proposed implementing least privilege and separation of duties through role-based access control; restricting data access as far up the directory hierarchy as possible; and routinely auditing permissions and roles. Kim and Lee (2020) [7] proposed an access control list that whitelists specific programs for each file type. Only whitelisted programs are allowed to access files.…”
Section: Related Literaturementioning
confidence: 99%
“…Kim et al [24] also published the results of their research on the subject in 2020. On the one hand, it also numerically describes that 70% of cyberattacks were committed by ransomware attacks as early as 2017, and that this rate has only drastically risen since then.…”
Section: State-of-the-art Research In Ransomware-type Cyberthreatsmentioning
confidence: 99%