2018
DOI: 10.1109/msp.2018.2701165
|View full text |Cite
|
Sign up to set email alerts
|

Protecting against Ransomware: A New Line of Research or Restating Classic Ideas?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
31
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(31 citation statements)
references
References 4 publications
0
31
0
Order By: Relevance
“…All keys used for encryption and decryption must be previously approved to meet complexity requirements. (Blanke & McGrady, 2016;Braga, Dahab, Antunes, Laranjeiro & Vieira, 2019;Coronado & Wong, 2014;Kharraz, Robertson & Kirda, 2018;Natsiavas et al, 2018) All portable devices must contain remote cleaning and geographic location tracking. (Blanke & McGrady, 2016) All devices must have lock enabled after three failed login attempts.…”
Section: Authorsmentioning
confidence: 99%
See 2 more Smart Citations
“…All keys used for encryption and decryption must be previously approved to meet complexity requirements. (Blanke & McGrady, 2016;Braga, Dahab, Antunes, Laranjeiro & Vieira, 2019;Coronado & Wong, 2014;Kharraz, Robertson & Kirda, 2018;Natsiavas et al, 2018) All portable devices must contain remote cleaning and geographic location tracking. (Blanke & McGrady, 2016) All devices must have lock enabled after three failed login attempts.…”
Section: Authorsmentioning
confidence: 99%
“…(Blanke & McGrady, 2016) All devices must have lock enabled after three failed login attempts. (Abraham et al, 2019;Blanke & McGrady, 2016;Busdicker & Upendra, 2017;Kharraz et al, 2018;Priestman, Anstis, Sebire, Sridharan & Sebire, 2019) All devices must have their operating systems, software, and antivirus updated as new releases and patches become available. (Abraham et al, 2019;Blanke & McGrady, 2016;Ondiege et al, 2017;Primo, Bishop, Lannum, Cram, Nader & Boodoo, 2018) All devices must have their data backed up on periodically backed up in a secure location on which cybersecurity experts have previously agreed.…”
Section: Authorsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the state of affairs changes drastically in the cyber-networks, because data protection offers less design flexibility to avoid a certain type of cyber-attacks. In particular, no matter how strong the encryption is, it is useless against a novel ransomware cyber-attack [14]. The ransomware attack does not break the encryption of target data and may encrypt the target data afresh.…”
Section: Introductionmentioning
confidence: 99%
“…The fourth technique of information protection is related to the monitoring of communication, in which case data transaction itself is examined for early detection of evasive malware execution. This approach makes it easier to counteract against new developing malware [14]. The monitoring itself appears not for protecting customers' data; but if we consider saving the monitoring records, then this idea can be expanded to lead to a new concept, namely, the registration of a batch of communication records in distributed ledgers.…”
Section: Introductionmentioning
confidence: 99%