Preventing Ransomware Attacks Through File System Filter Drivers

Conference object English OPEN
Bottazzi , Giovanni; Italiano , Giuseppe ,; Spera , Domenico;
(2018)
  • Publisher: HAL CCSD
  • Subject: [ INFO ] Computer Science [cs]

International audience; Over the last years ransomware attacks have been widely spreading over the Internet, indiscriminately targeting home users as well as corporates and public agencies. Several approaches have been proposed to analyze and detect ransomware intrusion... View more
  • References (9)

    Anderson et al. (November 2011). Graph-based malware detection using dynamic analysis. In: Journal in Computer Virology, November 2011, Vol. 7, Issue 4, pp 247-258 Choi et al. (July 2016). Ransomware Against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory. In: International Journal of Forensic Science & Pathology, Vol. 4, July 2016, pp. 253-258.

    Continella et al. (December 2016). ShieldFS: a self-healing, ransomware-aware filesystem. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 16, Los Angeles, CA, USA, December 05-08, 2016, pp 336-347.

    Cuckoo Foundation (2016). Cuckoo Sanbox: Automated Malware Analysis. 2016. Retrieved from https://cuckoosandbox.org.

    Dinaburg et al. (October 2008). Ether: malware analysis via hardware virtualization extensions. In: Proceedings of the 15th ACM conference on Computer and communications security, CCS, Alexandria, Virginia, USA, October 27-31, 2008, pp 51-62.

    Dingledine et al. (2004). Tor: The second-generation onion router. In: Proceedings of The 13th Usenix Security Symposium, San Diego, CA, August 09-13, 2004.

    Egele et al. (February 2012). A survey on automated dynamic malware-analysis techniques and tools. In: Journal ACM Computing Surveys (CSUR), Vol. 44, Issue 2, February 2012, Article No. 6.

    Forand (March 2015). PARCC postponed as N.J. school district's network 'held hostage' for bitcoins. Retrieved from http://www.nj.com/gloucester-county/index.ssf/2015/03/nj_school_districts_network_held_hostage_for_500_i.html Furnell et al. (November 2012). Power to the people? The evolving recognition of human aspects of security. In: Computers & Security, Vol. 31, Issue 8, November 2012, pp 983-988.

    Gazet (February 2010). Comparative analysis of various ransomware virii. In Journal in Computer Virology, Vol. 6, Issue 1, february 2010, pp 77-90.

    Green (July 2016). Hospitals are hit with 88% of all ransomware attacks. Retrieved from http://www.beckershospitalreview.com/healthcare-information-technology/hospitals-are-hit-with-88- of-all-ransomware-attacks.html.

  • Related Research Results (3)
  • Metrics
Share - Bookmark