2018 IEEE International Conference on Electro/Information Technology (EIT) 2018
DOI: 10.1109/eit.2018.8500161
|View full text |Cite
|
Sign up to set email alerts
|

RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…The reason for this is because the objective of a ransomware is to demand a ransom from its victim. Thus, it must have a threatening message embedded in its code [13]. However, the threatening message could be another payload after the encryption of the victim's files.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The reason for this is because the objective of a ransomware is to demand a ransom from its victim. Thus, it must have a threatening message embedded in its code [13]. However, the threatening message could be another payload after the encryption of the victim's files.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Rule-Based Detection Three rule-based mobile ransomware detection systems were proposed by researchers that use threshold values for detection. RanDroid [24] extracts images and strings from applications and calculates their similarity to the images and strings of ransomware samples. Based on the threshold values, it detects mobile ransomware.…”
Section: Ransomware Detection For Mobile Devicesmentioning
confidence: 99%
“…It also has better accuracy, recall rate, precision rate and F-measure than K-Nearest Neighbor, Neural Network, Support Vector Machine and Random Forest. Another enhanced solution is a novel lightweight approach known as RanDroid for automated detection of polymorphic ransomware (Alzahrani et al, 2018). The technique detects new ransomware variants on Android platforms using the structural similarity measures between features extracted from an application and a set of threat data extracted from known ransomware variants.…”
Section: Static and Dynamic Analysismentioning
confidence: 99%
“…The proposed technique should be prototyped and deployed in a real-world IoT environment in order to evaluate and refine it. A future work should focus on increasing the accuracy of Randroid proposed by Alzahrani et al (2018) by adding of more samples of malicious images and strings to the ISM database and the SSM database respectively. The new images should include logos of governments and icons of law enforcement agencies.…”
Section: Future Research Directionsmentioning
confidence: 99%