2016 2nd IEEE International Conference on Computer and Communications (ICCC) 2016
DOI: 10.1109/compcomm.2016.7924925
|View full text |Cite
|
Sign up to set email alerts
|

A novel method for recovery from Crypto Ransomware infections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(11 citation statements)
references
References 2 publications
0
11
0
Order By: Relevance
“…However, the log files did produce other notable entries, particularly the ransomware variants terminating the “vssadmin.exe” process responsible for volume shadow copy backups. This is a common tactic used by ransomware to prevent the users, and some commercial backup applications, from restoring their data through a shadow copy of the disk prior to the ransomware infection [ 98 , 99 ]. By showing that the ransomware variants terminated this process, we can determine that the ransomware variants executed successfully and did not alter their execution process as a result of sandbox detection.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
“…However, the log files did produce other notable entries, particularly the ransomware variants terminating the “vssadmin.exe” process responsible for volume shadow copy backups. This is a common tactic used by ransomware to prevent the users, and some commercial backup applications, from restoring their data through a shadow copy of the disk prior to the ransomware infection [ 98 , 99 ]. By showing that the ransomware variants terminated this process, we can determine that the ransomware variants executed successfully and did not alter their execution process as a result of sandbox detection.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
“…Their result achieved an area under the curve around 0.995, but at the same time, the result has a relatively high false positives ratio. Weckstén et al [8] used the file system activity, registry manipulation, software process monitor, and regshots for tracking the processing activity in zeltzers. They found that the crypto-ransomware attacks depend on the executable file of "vssadmin.exe".…”
Section: Related Workmentioning
confidence: 99%
“…However, crypto-ransomware is much more destructive in general as current encryption techniques (e.g., AES and RSA) are almost impossible to be reverted. And this despite some proposals have been developed to overcome this situation [6,7,8]. From this perspective, prevention is the first and most recommended method to fight against cryptoransomware at present [9].…”
Section: Introductionmentioning
confidence: 99%