HelDroid: Dissecting and Detecting Mobile Ransomware

作者: Nicoló Andronio , Stefano Zanero , Federico Maggi

DOI: 10.1007/978-3-319-26362-5_18

关键词:

摘要: … The reason is because ransomware schemes are … ransomware variants from all the existing families, our key insight is to recognize specific, distinctive features of the ransomware tactics …

参考文章(23)
Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis, AndRadar: Fast Discovery of Android Applications in Alternative Markets international conference on detection of intrusions and malware, and vulnerability assessment. pp. 51- 71 ,(2014) , 10.1007/978-3-319-08509-8_4
Felix Gröbert, Carsten Willems, Thorsten Holz, Automated Identification of Cryptographic Primitives in Binary Programs Lecture Notes in Computer Science. pp. 41- 60 ,(2011) , 10.1007/978-3-642-23644-0_3
Michele Spagnuolo, Federico Maggi, Stefano Zanero, BitIodine: Extracting Intelligence from the Bitcoin Network Financial Cryptography and Data Security. pp. 457- 468 ,(2014) , 10.1007/978-3-662-45472-5_29
Charu C. Aggarwal, ChengXiang Zhai, A survey of text classification algorithms Mining Text Data. pp. 163- 222 ,(2012) , 10.1007/978-1-4614-3223-4_6
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Chris Jarabek, David Barrera, John Aycock, ThinAV Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12. pp. 209- 218 ,(2012) , 10.1145/2420950.2420983
Johannes Hoffmann, Martin Ussath, Thorsten Holz, Michael Spreitzenbarth, Slicing droids: program slicing for smali code acm symposium on applied computing. pp. 1844- 1851 ,(2013) , 10.1145/2480362.2480706
Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna, Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23328
Federico Maggi, Andrea Valdi, Stefano Zanero, AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors security and privacy in smartphones and mobile devices. pp. 49- 54 ,(2013) , 10.1145/2516760.2516768
Adam L. Young, Cryptoviral extortion using Microsoft's Crypto API International Journal of Information Security. ,vol. 5, pp. 67- 76 ,(2006) , 10.1007/S10207-006-0082-7