Exploiting ransomware paranoia for execution prevention

dc.contributor.authorAl Sabeh Ali Mazhar
dc.contributor.departmentDepartment of Computer Science
dc.contributor.facultyFaculty of Arts and Sciences.
dc.contributor.institutionAmerican University of Beirut.
dc.date2019
dc.date.accessioned2021-09-23T08:57:08Z
dc.date.available2021-09-23T08:57:08Z
dc.date.issued2019
dc.date.submitted2019
dc.descriptionThesis. M.S. American University of Beirut. Department of Computer Science 2019. T:7156.
dc.descriptionAdvisor : Dr. Haidar Safa; Professor, Computer Science ; Co-Advisor : Dr. Elias Bou-Harb, Associate Professor, Computer Science – Florida Atlantic University ; Members of Committee : Dr. Mohamad El Baker Nassar; Assistant Professor, Computer Science ; Dr. Wassim El Hajj; Associate Professor, Computer Science.
dc.descriptionIncludes bibliographical references (leaves 88-93)
dc.description.abstractRansomware attacks cost businesses more than $75 billion-year, and it is predicted to cost $6 trillion-year by 2021. These numbers demonstrate the havoc produced by ransomware on a large number of sectors and urge security researches to tackle it. Several ransomware detection approaches have been proposed in the literature that interchange between static and dynamic analysis. Recently, ransomware attacks were shown to fingerprint the execution environment before they attack the system to counter dynamic analysis. In this thesis, we exploit the behavior of contemporary ransomware to prevent its attack on real systems and thus avoid the loss of any data. We explore a set of ransomware-generated artifacts that are launched to sniff the surrounding. Furthermore, we design, develop, and evaluate an approach that monitors the behavior of a program by intercepting the called Windows APIs. Consequently, we determine in real-time if the program is trying to inspect its surrounding before the attack, and abort it immediately prior to the initiation of any malicious encryption or locking. Through empirical evaluations using real and recent ransomware samples, we study how ransomware and benign programs inspect the environment. Additionally, we demonstrate how to prevent ransomware with a low false positive rate. We make the developed approach available to the research community at large through GitHub to strongly promote cyber security defense operations and for wide-scale evaluations and enhancements.
dc.format.extent1 online resource (xiii, 93 leaves) : illustrations
dc.identifier.otherb25897895
dc.identifier.urihttp://hdl.handle.net/10938/23135
dc.language.isoen
dc.subject.classificationT:007156
dc.subject.lcshData protection.
dc.subject.lcshComputer security.
dc.subject.lcshData encryption (Computer science)
dc.titleExploiting ransomware paranoia for execution prevention
dc.typeThesis

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
t-7136.pdf
Size:
5.1 MB
Format:
Adobe Portable Document Format