Acknowledgement
이 논문은 홍익대학교의 '지역특화형 스마트시티 전문대학원 구축 사업'의 지원을 받아 수행된 결과임.
References
- K. M. Kim, J. S. Kim, and Y. J Lee, "Ransomware trends & Statistics, First Quarter for 2022," KISA, pp.2, 2022. https://seed.kisa.or.kr/kisa/Board/130/detailView.do
- G. H. Lee, M. C. Hwang, Y. I. Ku, D. Y. Hyun, and D. Y. Yoo, "A study on the ransomware detection model using the clustering and similarity analysis of opcode and API," Proceedings of the Annual Spring Conference of Korea Information Processing Society Conference (KIPS), Vol.29, pp.179-180, 2022.
- G. H. Lee, M. C. Hwang, Y. I. Ku, D. Y. Hyun, and D. Y. Yoo, "A study on the ransomware detection model using the clustering and similarity analysis of opcode and API", Proceedings of the Annual Spring Conference of Korea Information Processing Society Conference (KIPS), Vol.29, pp.182, 2022.
- D. Vidyarthi, C. Kumar, S. Rakshit, and S. Chansarkar, "Static malware analysis to identify ransomware properties," IJCSI International Journal of Computer Science Issues, Vol.16, Iss.3, pp.1-8, 2019.
- I. Kara and M. Aydos, "Static and dynamic analysis of third generation cerber ransomware," International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism, 2018.
- P. O'Kane, S. Sezer, K. McLaughlin, and E. G. Im, "SVM training phase reduction using dataset feature filtering for malware detection," Journal of IEEE Transactions on Information Forensics and Security, Vol.8, No.3, pp.500-509, 2013. https://doi.org/10.1109/TIFS.2013.2242890
- M. Zhang, Y. Duan, H. Yin, and Z. Zhao, "Seman-ticsaware android malware classification using weighted contextual API dependency graphs," Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.1105-1116, 2014.
- M. Hasan and M. Rahman, "RansHunt: A support vector machines based ransomware analysis framework with integrated feature set," 2017 20th International Conference of Computer and Information Technology (ICCIT), Dec. 2017.
- K. W. Moon and J. H. Lee "Analysis of the latest ransomware features," Sangmyung University, 2018.
- Ahnlab ASEC, "Cerber ransomware demanding money by voice," 2016.
- O. C. Kwon, S. J. Bae, J. I. Cho, and J. S. Moon, "Malicious codes re-grouping methods using fuzzy clustering based on native API frequency," Journal of The Korea Institute of Information Security and Cryptology, Vol.18, No.6, pp.115-127, 2008.
- INFOSEC, Windows functions in malware analysis part1, May 26, 2015. https://resources.infosecinstitute.com/topic/windows-functions-in-malware-analysis-cheat-sheet-part-1/.
- J. W. Kim, "A study on Machine Learning-based Ransomware Detection Model using Hybrid Analysis," Konkuk University for Master's Degree in Korea, 2017.