2016
DOI: 10.1155/2016/2946735
|View full text |Cite
|
Sign up to set email alerts
|

The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform

Abstract: Due to recent indiscriminate attacks of ransomware, damage cases including encryption of users’ important files are constantly increasing. The existing vaccine systems are vulnerable to attacks of new pattern ransomware because they can only detect the ransomware of existing patterns. More effective technique is required to prevent modified ransomware. In this paper, an effective method is proposed to prevent the attacks of modified ransomware on Android platform. The proposed technique specifies and intensive… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
64
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 89 publications
(64 citation statements)
references
References 6 publications
0
64
0
Order By: Relevance
“…And it is very much essential that these loopholes are to be corrected in the Android OS itself. There are possibilities where the application which is allowed by some specific permissions such as read contacts, read/write storage, can be taking user data to their servers without even user's knowledge [14]. After the permissions are allowed to the user, it is not notified to the user about what information from their device is being used or taking it to the application servers.…”
Section: User Data Privacymentioning
confidence: 99%
“…And it is very much essential that these loopholes are to be corrected in the Android OS itself. There are possibilities where the application which is allowed by some specific permissions such as read contacts, read/write storage, can be taking user data to their servers without even user's knowledge [14]. After the permissions are allowed to the user, it is not notified to the user about what information from their device is being used or taking it to the application servers.…”
Section: User Data Privacymentioning
confidence: 99%
“…9 CryZip This ransomware emerged in 2006, and it generates password-protected zip files based on a commercial zip library without the cryptographic operation. This ransomware contains the Pony module.…”
Section: Revetonmentioning
confidence: 99%
“…9 To counteract the ransomware, a ransomware prevention program and a recovery service of encrypted files emerged based on the countermeasures above, and the following are examples: The advantage of this method is the capability of repairing the encrypted files when an antivirus product does not detect the ransomware.…”
Section: Previous Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…using bitcoins) in order to obtain the password or decryption key (Song et al 2016). Consequences include temporary or permanent loss of sensitive information, disruption of regular operations, direct/indirect financial losses (e.g., to restore systems and restore an organizations reputation) (FBI 2016).…”
mentioning
confidence: 99%