Loading…

Efficacy of Android security mechanisms on ransomware analysis and detection

Ransomware being the most threatening mobile malware type; extorts money by taking control of the user’s confidential data. Ransomware targets finances that result in consequent loss of reputation by stealing/locking user’s confidential data. The possible reason for its tremendous growth could be a...

Full description

Saved in:
Bibliographic Details
Main Authors: Gera, Tanya, Singh, Jaiteg, Faruki, Parvez, Thakur, Deepak
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Ransomware being the most threatening mobile malware type; extorts money by taking control of the user’s confidential data. Ransomware targets finances that result in consequent loss of reputation by stealing/locking user’s confidential data. The possible reason for its tremendous growth could be a rise in mobile transactions, IoT enabled smart devices and dependency on cloud-based services. Privacy is a big concern as hackers are stealing data and misusing it by engineering malicious applications as well as devising new solutions for defeating existing detection frameworks. Hence, this has created a need for a more robust and sophisticated framework for dealing with smart malware. In this study, effective mechanisms from the year 2009 to 2019 have been referred. Existing primitive solutions uses static and dynamic mechanisms to analyze and detect ransomware. The study of existing frameworks helped to identify prominent device properties, vulnerabilities that are prone to ransomware infections. Subsequently, a comprehensive analysis of static and dynamic techniques would be done for identification and detection of ransomware. Future practitioners may carefully observe literature gap to work on lacking areas. One of the main contributions of this study is to provide a proposed hybrid solution to detect ransomware effectively.
ISSN:0094-243X
1551-7616
DOI:10.1063/5.0080931