Acknowledgement
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government (MSIT)(No. NRF-2021R1F1A1062954).
References
- F. Aloul, "Smart grid security: Threats, vulnerabilities and solutions," International Journal of Smart Grid and Clean Energy, vol.1, no.1, pp.1-6, 2012. DOI: 10.12720/sgce.1.1.1-6
- K. Toh, "Security for smart cities," IET Smart Cities, vol.2, no.2, pp.95-104,
- N. Tariq, "Blockchain and smart healthcare security: a survey," Procedia Computer Science, vol.175, pp.615-620, 2020. DOI: 10.1016/j.procs.2020.07.089
- R. Bold, H. Khateeb, and N. Ersotelos, "Reducing False Negatives in Ransomware Detection: A Critical Evaluation of Machine Learning Algorithms," Appl. Sci. 2022, Vol.12, no.24, pp.12941, 2022. DOI: 10.3390/app122412941
- S. Osborn, "Mandatory access control and role-based access control revisited," Proceedings of the second ACM workshop on Role-based access control. 1997. DOI: 10.1145/266741.266751
- Microsoft Docs, "Enable controlled folder access," Online: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/enable-controlled-folders?view=o365-worldwide
- D. Kim and J. Lee, "Blacklist vs. Whitelist-Based Ransomware Solutions," IEEE Consumer Electronics Magazine, vol.9, no.3, pp.22-28, 2020. DOI: 10.1109/MCE.2019.2956192
- A. Klein and I. Kotler, "Windows Process Injection in 2019," Black Hat USA 2019, 2019. Online: https://i.blackhat.com/USA-19/ Thursday/us-19-Kotler-Process-InjectionTechniques-Gotta-Catch-Them-All-wp.pdf
- L. Abrams, "Windows 10 Ransomware Protection Bypassed Using DLL Injection," Online: https://www.bleepingcomputer.com/news/security/windows-10-ransomware-protection-bypassed-using-dll-injection/
- B. Ko, W. Choi, and D. Jeong, "A Study on the Tracking and Blocking of Malicious Actors through Thread-Based Monitoring," Journal of the Korea Institute of Information Security & Cryptology, vol.30, no.1, pp.75-86, 2020. DOI: 10.1016/j.jcss.2014.02.005
- S. Cheon, G. Choi, and D. Kim, "A Cheating Attack on a Whitelist-based Anti-Ransomware Solution and its Countermeasure," 2023 IEEE International Conference on Consumer Electronics (ICCE), 2023. DOI: 10.1109/ICCE56470.2023.10043480
- S. Ramachandran, J. Rami, A. Shah, K. Kim, and D Rathod, "Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection," International Journal of Electronic Security and Digital Forensics, vol.15, no.4, pp.424-442, 2023. DOI: 10.1504/IJESDF.2023.131961
- Microsoft Docs, "CreateRemoteThread Function," Online: https://learn.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-createremotethread.
- J. Seong, "A Study on Injection Attacks and Defenses on Microsoft Windows," Journal of Software Assessment and Valuation, vol.16, no.2, pp.9-23, 2020. DOI: 10.29056/jsav.2020.12.02s