최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기전기전자학회논문지 = Journal of IKEEE, v.27 no.3, 2023년, pp.239 - 245
김대엽 (Dept. of Information Security, Suwon University)
Whitelist-based ransomware solution is known as being vulnerable to false impersonation attack using DLL injection attack. To solve this problem, it is proposed to monitor DLL injection attack and to integrate the monitoring result to ransomware solutions. In this paper, we show that attackers can e...
F. Aloul, "Smart grid security: Threats, vulnerabilities and solutions," International Journal of?Smart Grid and Clean Energy, vol.1, no.1, pp.1-6,?2012. DOI: 10.12720/sgce.1.1.1-6
K. Toh, "Security for smart cities," IET Smart?Cities, vol.2, no.2, pp.95-104,
N. Tariq, "Blockchain and smart healthcare?security: a survey," Procedia Computer Science,?vol.175, pp.615-620, 2020.?DOI: 10.1016/j.procs.2020.07.089
R. Bold, H. Khateeb, and N. Ersotelos, "Reducing?False Negatives in Ransomware Detection: A Critical?Evaluation of Machine Learning Algorithms," Appl.?Sci. 2022, Vol.12, no.24, pp.12941, 2022.?DOI: 10.3390/app122412941
Microsoft Docs, "Enable controlled folder access,"?Online: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/enable-controlled-folders?viewo365-worldwide
D. Kim and J. Lee, "Blacklist vs. Whitelist-Based?Ransomware Solutions," IEEE Consumer Electronics?Magazine, vol.9, no.3, pp.22-28, 2020.?DOI: 10.1109/MCE.2019.2956192
A. Klein and I. Kotler, "Windows Process Injection?in 2019," Black Hat USA 2019, 2019. Online: https://i.blackhat.com/USA-19/ Thursday/us-19-Kotler-Process-InjectionTechniques-Gotta-Catch-Them-All-wp.pdf
L. Abrams, "Windows 10 Ransomware Protection?Bypassed Using DLL Injection," Online: https://www.bleepingcomputer.com/news/security/windows-10-ransomware-protection-bypassed-using-dll-injection/
B. Ko, W. Choi, and D. Jeong, "A Study on?the Tracking and Blocking of Malicious Actors?through Thread-Based Monitoring," Journal of?the Korea Institute of Information Security &?Cryptology, vol.30, no.1, pp.75-86, 2020.?DOI: 10.1016/j.jcss.2014.02.005
S. Ramachandran, J. Rami, A. Shah, K. Kim,?and D Rathod, "Defence against crypto-ransomware?families using dynamic binary instrumentation?and DLL injection," International Journal of?Electronic Security and Digital Forensics, vol.15,?no.4, pp.424-442, 2023.?DOI: 10.1504/IJESDF.2023.131961
Microsoft Docs, "CreateRemoteThread Function,"?Online: https://learn.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-createremotethread.
J. Seong, "A Study on Injection Attacks and?Defenses on Microsoft Windows," Journal of?Software Assessment and Valuation, vol.16, no.2,?pp.9-23, 2020. DOI: 10.29056/jsav.2020.12.02s
※ AI-Helper는 부적절한 답변을 할 수 있습니다.