Academic Paper Summary
The first page of an article (Cimitle et al., 2017) |
"Talos: no more ransomware victims with formal methods" written by Cimitile, Mercaldo, Nardone, Santone and Visaggio is discussing different ways to prevent the ransomware attacks on Android devices. Authors provided evidence, which is prooving the high rate of ransomware attacks on mobile devices based on Android. Furthermore, the authors provided the summarize of most popular recently techniques, which are using to denied the ransomware attacks. Moreover, the article contains a few different protection models proposed by cybersecurity specialists such as method based on system call sequences and machine learning or the static detection system based on four scanning layers. Additionally, the authors are showing some formal methods for detecting ransomware attacks such as processes and files monitoring based on the processor usage or by using PushDown System. Moreover, the authors discuss using the algebra system CCS in case of denied the ransomware attack including the pros of this technique. One of the pros they mentioned is the fact that the described method can check not only given sentence. Moreover, the formula can check the logical structure of the file and detect the similarities with already known, reported as dangerous files. The CCS model has been implemented to Talos tool (Java system created to prevent ransomware attack on Android devices). By using the mentioned formula, Talos software was able to check the logical formula of files, and state some of the apps as ransomware family. To compare with other anti-malware software, authors state that, Talos tool has the biggest rate of detected dangerous files, which was over 99%. However, the authors state that ransomware is still an open subject. It means in the future we can expect more difficult to prevent attacks and it may be possible to find other, more successful methods to protect. To sum up, authors by analysing different ways to denied the ransomware attack had chosen one, which they applied to Talos software. That action allows them to create software, which was able to decline over 99% of ransomware attacks during the tests.
References
Cimitile, A., Mercaldo, F., Nardone, V., Santone, A. and Visaggio, C., 2018. Talos: no more ransomware victims with formal methods. International Journal of Information Security, [online] 17(6), pp.719-738. Available at: <https://search-proquest-com.proxy.library.dmu.ac.uk/docview/1978527548?pq-origsite=summon> [Accessed 5 December 2020].
Hi
ReplyDeletePlease add references (following Harvard style) and in text citations (again following Harvard style )for screenshots as we have discussed.
A gentle reminder:
Please note that it is possible to have more than 30 posts as per given list on blackboard.
Follow the list given on blackboard (announcements).
Please do not forget to submit Final Assessment Submission Form before deadline (11 Dec 2020 by 5 pm UK time).
Many thanks
Chirag