2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT) 2022
DOI: 10.1109/ccict56684.2022.00107
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain: Tool for Controlling Ransomware through Pre-Encryption and Post-Encryption Behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 14 publications
0
1
0
Order By: Relevance
“…The evolution from encryption-centric onslaughts to strategies that primarily engage in data theft has marked a pivotal change in the ransomware domain [15], [16], [17]. This shift has demanded a thorough reevaluation of countermeasures and analytical techniques within the cyber defense community [18], [19], [20].…”
Section: Entropy and Memory Forensics In Ransomwarementioning
confidence: 99%
“…The evolution from encryption-centric onslaughts to strategies that primarily engage in data theft has marked a pivotal change in the ransomware domain [15], [16], [17]. This shift has demanded a thorough reevaluation of countermeasures and analytical techniques within the cyber defense community [18], [19], [20].…”
Section: Entropy and Memory Forensics In Ransomwarementioning
confidence: 99%
“…Additionally, smart contract logic must encode robust access restrictions customized to organizational data usage and classification policies to prevent leakage of sensitive metadata [30], [35]. Regular compliance and security audits can help verify that transactions adhere to the access control rules [73], [72]. Overall, blockchain's unique privacy attributes demand a closer examination of vulnerabilities and a layered approach combining encryption, access control and auditing helps realize the technology's benefits without sacrificing privacy [36], [32].…”
Section: Data Privacy Considerationsmentioning
confidence: 99%
“…The evolution from encryption-centric onslaughts to strategies that primarily engage in data theft has marked a pivotal change in the ransomware domain [15], [16], [17]. This shift has demanded a thorough reevaluation of countermeasures and analytical techniques within the cyber defense community [18], [19], [20].…”
Section: Entropy and Memory Forensics In Ransomwarementioning
confidence: 99%