{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T11:15:30Z","timestamp":1726485330000},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030630942"},{"type":"electronic","value":"9783030630959"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63095-9_7","type":"book-chapter","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T08:07:25Z","timestamp":1607674045000},"page":"120-140","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["On the Effectiveness of Behavior-Based Ransomware Detection"],"prefix":"10.1007","author":[{"given":"Jaehyun","family":"Han","sequence":"first","affiliation":[]},{"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Donald E.","family":"Porter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,12]]},"reference":[{"issue":"6","key":"7_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MNET.2016.1600110NM","volume":"30","author":"K Cabaj","year":"2016","unstructured":"Cabaj, K., Mazurczyk, W.: Using software-defined networking for ransomware mitigation: the case of CryptoWall. IEEE Netw. 30(6), 14\u201320 (2016)","journal-title":"IEEE Netw."},{"key":"7_CR2","unstructured":"Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring pay-per-install: the commoditization of malware distribution. In: USENIX Security Symposium, p. 13 (2011)"},{"issue":"8","key":"7_CR3","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H Cheng","year":"2000","unstructured":"Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439\u20132451 (2000)","journal-title":"IEEE Trans. Signal Process."},{"key":"7_CR4","unstructured":"Common Crawl Document Download. https:\/\/github.com\/centic9\/CommonCrawlDocumentDownload"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Continella, A., et al.: ShieldFS: a self-healing, ransomware-aware filesystem. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 336\u2013347. ACM (2016)","DOI":"10.1145\/2991079.2991110"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Cusack, G., Michel, O., Keller, E.: Machine learning-based detection of ransomware using SDN. In: Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, pp. 1\u20136. ACM (2018)","DOI":"10.1145\/3180465.3180467"},{"key":"7_CR7","unstructured":"CyberEdge Group: 2018 cyberthreat defense report. Technical report, CyberEdge Group (2018)"},{"issue":"6\u20138","key":"7_CR8","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/s00371-010-0448-8","volume":"26","author":"M Ding","year":"2010","unstructured":"Ding, M., Tong, R.F.: Content-aware copying and pasting in images. Visual Comput. 26(6\u20138), 721\u2013729 (2010)","journal-title":"Visual Comput."},{"issue":"4","key":"7_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(16)30036-7","volume":"2016","author":"C Everett","year":"2016","unstructured":"Everett, C.: Ransomware: to pay or not to pay? Comput. Fraud Secur. 2016(4), 8\u201312 (2016)","journal-title":"Comput. Fraud Secur."},{"key":"7_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-981-10-8527-7_29","volume-title":"Data Science and Analytics","author":"K Gangwar","year":"2018","unstructured":"Gangwar, K., Mohanty, S., Mohapatra, A.K.: Analysis and detection of ransomware through its delivery methods. In: Panda, B., Sharma, S., Roy, N.R. (eds.) REDSET 2017. CCIS, vol. 799, pp. 353\u2013362. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-8527-7_29"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"S2","DOI":"10.1016\/j.diin.2009.06.016","volume":"6","author":"S Garfinkel","year":"2009","unstructured":"Garfinkel, S., Farrell, P., Roussev, V., Dinolt, G.: Bringing science to digital forensics with standardized forensic corpora. Digit. Investig. 6, S2\u2013S11 (2009)","journal-title":"Digit. Investig."},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-030-03638-6_24","volume-title":"Secure IT Systems","author":"ZA Gen\u00e7","year":"2018","unstructured":"Gen\u00e7, Z.A., Lenzini, G., Ryan, P.Y.A.: Next generation cryptographic ransomware. In: Gruschka, N. (ed.) NordSec 2018. LNCS, vol. 11252, pp. 385\u2013401. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03638-6_24"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Huang, D.Y., et al.: Tracking ransomware end-to-end. In: Tracking Ransomware End-to-end. IEEE (2018)","DOI":"10.1109\/SP.2018.00047"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Huang, J., Xu, J., Xing, X., Liu, P., Qureshi, M.K.: FlashGuard: leveraging intrinsic flash properties to defend against encryption ransomware. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2231\u20132244. ACM (2017)","DOI":"10.1145\/3133956.3134035"},{"key":"7_CR15","unstructured":"Kharraz, A., Arshad, S., Mulliner, C., Robertson, W.K., Kirda, E.: UNVEIL: a large-scale, automated approach to detecting ransomware. In: USENIX Security Symposium, pp. 757\u2013772 (2016)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-319-66332-6_5","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"A Kharraz","year":"2017","unstructured":"Kharraz, A., Kirda, E.: Redemption: real-time protection against ransomware at end-hosts. In: Dacier, M., Bailey, M., Polychronakis, M., Antonakakis, M. (eds.) RAID 2017. LNCS, vol. 10453, pp. 98\u2013119. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66332-6_5"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-20550-2_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A Kharraz","year":"2015","unstructured":"Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the gordian knot: a look under the hood of ransomware attacks. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 3\u201324. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20550-2_1"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Kolodenker, E., Koch, W., Stringhini, G., Egele, M.: PayBreak: defense against cryptographic ransomware. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 599\u2013611. ACM (2017)","DOI":"10.1145\/3052973.3053035"},{"key":"7_CR19","unstructured":"Marpaung, J.A., Sain, M., Lee, H.J.: Survey on malware evasion techniques: state of the art and challenges. In: 2012 14th International Conference on Advanced Communication Technology (ICACT), pp. 744\u2013749. IEEE (2012)"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-030-00470-5_6","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"S Mehnaz","year":"2018","unstructured":"Mehnaz, S., Mudgerikar, A., Bertino, E.: RWGuard: a real-time detection system against cryptographic ransomware. In: Bailey, M., Holz, T., Stamatogiannakis, M., Ioannidis, S. (eds.) RAID 2018. LNCS, vol. 11050, pp. 114\u2013136. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00470-5_6"},{"key":"7_CR21","unstructured":"Mohurle, S., Patil, M.: A brief study of Wannacry threat: ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 8(5) (2017)"},{"key":"7_CR22","unstructured":"Nieuwenhuizen, D.: A behavioural-based approach to ransomware detection. Whitepaper, MWR Labs Whitepaper (2017)"},{"key":"7_CR23","unstructured":"The No More Ransom Project. https:\/\/www.nomoreransom.org\/en\/index.html"},{"key":"7_CR24","unstructured":"Offline Ransomware Encrypts Your Data without C&C Communication. https:\/\/blog.checkpoint.com\/2015\/11\/04\/offline-ransomware-encrypts-your-data-without-cc-communication\/"},{"key":"7_CR25","unstructured":"PDF Tools. http:\/\/www.pdf-tools.com"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Ramilli, M., Bishop, M., Sun, S.: Multiprocess malware. In: 2011 6th International Conference on Malicious and Unwanted Software (MALWARE), pp. 8\u201313. IEEE (2011)","DOI":"10.1109\/MALWARE.2011.6112320"},{"key":"7_CR27","unstructured":"11 ransomware trends for 2018. https:\/\/www.csoonline.com\/article\/3267544\/ransomware\/11-ways-ransomware-is-evolving.html"},{"issue":"1","key":"7_CR28","first-page":"10","volume":"13","author":"R Richardson","year":"2017","unstructured":"Richardson, R., North, M.: Ransomware: evolution, mitigation and prevention. Int. Manag. Rev. 13(1), 10\u201321 (2017)","journal-title":"Int. Manag. Rev."},{"volume-title":"The Evolution of Ransomware","year":"2015","author":"K Savage","key":"7_CR29","unstructured":"Savage, K., Coogan, P., Lau, H.: The Evolution of Ransomware. Symantec, Mountain View (2015)"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Scaife, N., Carter, H., Traynor, P., Butler, K.R.: CryptoLock (and drop it): stopping ransomware attacks on user data. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 303\u2013312. IEEE (2016)","DOI":"10.1109\/ICDCS.2016.46"},{"key":"7_CR31","unstructured":"Shannon, C.E.: The mathematical theory of communication (1963)"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Snow, K.Z., Monrose, F., Davi, L., Dmitrienko, A., Liebchen, C., Sadeghi, A.R.: Just-in-time code reuse: on the effectiveness of fine-grained address space layout randomization. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 574\u2013588. IEEE (2013)","DOI":"10.1109\/SP.2013.45"},{"issue":"96","key":"7_CR33","first-page":"3","volume":"5","author":"E Wiewall","year":"1996","unstructured":"Wiewall, E.: Secure your applications with the Microsoft CryptoAPI. Microsoft Dev. Netw. News 5(96), 3 (1996)","journal-title":"Microsoft Dev. Netw. News"},{"issue":"1","key":"7_CR34","first-page":"26","volume":"11","author":"A Zimba","year":"2019","unstructured":"Zimba, A., Chishimba, M.: Understanding the evolution of ransomware: paradigm shifts in attack structures. Int. J. Comput. Netw. Inf. Secur. 11(1), 26\u201339 (2019)","journal-title":"Int. J. Comput. Netw. Inf. Secur."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63095-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T21:37:31Z","timestamp":1619300251000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-63095-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030630942","9783030630959"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63095-9_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"120","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,86","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}