2024
DOI: 10.3390/s24051446
|View full text |Cite
|
Sign up to set email alerts
|

Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations

Jiseok Bang,
Jeong Nyeo Kim,
Seungkwang Lee

Abstract: This study presents a groundbreaking approach to the ever-evolving challenge of ransomware detection. A lot of detection methods predominantly rely on pinpointing high-entropy blocks, which is a hallmark of the encryption techniques commonly employed in ransomware. These blocks, typically difficult to recover, serve as key indicators of malicious activity. So far, many neutralization techniques have been introduced so that ransomware utilizing standard encryption can effectively bypass these entropy-based dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 42 publications
(52 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?