Defeating Ransomware By Hooking System Calls On Windows Os

but.event.date27.04.2021cs
but.event.titleSTUDENT EEICT 2021cs
dc.contributor.authorTouš, Filip
dc.date.accessioned2021-07-21T07:06:58Z
dc.date.available2021-07-21T07:06:58Z
dc.date.issued2021cs
dc.description.abstractThis paper explains why ransomware needs to use the Windows API to encrypt files andhow this can be utilized to protect sensitive data from ransomware. Critical API functions are examinedon a low level and a generic method to monitor and possibly block their usage through systemcall hooks is presented. This approach is then demonstrated with a custom kernel mode driver whichcan keep protected files safe from any user mode malware. It is then compared to current ransomwareprotection in Windows 10.en
dc.formattextcs
dc.format.extent24-27cs
dc.format.mimetypeapplication/pdfen
dc.identifier.citationProceedings I of the 27st Conference STUDENT EEICT 2021: General papers. s. 24-27. ISBN 978-80-214-5942-7cs
dc.identifier.isbn978-80-214-5942-7
dc.identifier.urihttp://hdl.handle.net/11012/200756
dc.language.isocscs
dc.publisherVysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologiícs
dc.relation.ispartofProceedings I of the 27st Conference STUDENT EEICT 2021: General papersen
dc.relation.urihttps://conf.feec.vutbr.cz/eeict/index/pages/view/ke_stazenics
dc.rights© Vysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologiícs
dc.rights.accessopenAccessen
dc.subjectransomwareen
dc.subjectWindows APIen
dc.subjectsystem callen
dc.subjecthookingen
dc.titleDefeating Ransomware By Hooking System Calls On Windows Osen
dc.type.driverconferenceObjecten
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
eprints.affiliatedInstitution.departmentFakulta elektrotechniky a komunikačních technologiícs
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
24_eeict-2021_1.pdf
Size:
258.39 KB
Format:
Adobe Portable Document Format
Description: