Presentation | 2020-03-02 Development of a recovery tool for a ransomware infected PC Ryosuke Kokado, Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani, Masakatu Morii, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In recent years, malware called ransomware, which encrypts data on terminal devices, including servers and personal computers, and requires a price (ransom) based on the quality of the decryption key, has become popular. In this study, we propose a method of recovering the decryption key from MedusaLocker, a ransomware whose recovery method has not been generally known until now, and demonstrate the effectiveness of this method. We also develop a tool to recover the decryption key from a PC or the like infected with ransomware and automatically recover it to the state before infection. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | malware / ransomware |
Paper # | ICSS2019-77 |
Date of Issue | 2020-02-24 (ICSS) |
Conference Information | |
Committee | ICSS / IPSJ-SPT |
---|---|
Conference Date | 2020/3/2(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Okinawa-Ken-Seinen-Kaikan |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Security, Trust, etc. |
Chair | Hiroki Takakura(NII) |
Vice Chair | Katsunari Yoshioka(Yokohama National Univ.) / Kazunori Kamiya(NTT) |
Secretary | Katsunari Yoshioka(NICT) / Kazunori Kamiya(KDDI labs.) |
Assistant | Keisuke Kito(Mitsubishi Electric) / Toshihiro Yamauchi(Okayama Univ.) |
Paper Information | |
Registration To | Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Development of a recovery tool for a ransomware infected PC |
Sub Title (in English) | |
Keyword(1) | malware |
Keyword(2) | ransomware |
1st Author's Name | Ryosuke Kokado |
1st Author's Affiliation | Kobe University(Kobe Univ.) |
2nd Author's Name | Masato Ikegami |
2nd Author's Affiliation | Malware Laboratory, Endpoint SecurityTechnology Devel-opment Division, Endpoint Security Planning Group, CanonMarketing Japan In(Canon MJ) |
3rd Author's Name | Tomohisa Hasegawa |
3rd Author's Affiliation | Malware Laboratory, Endpoint SecurityTechnology Devel-opment Division, Endpoint Security Planning Group, CanonMarketing Japan In(Canon MJ) |
4th Author's Name | Takafumi Harada |
4th Author's Affiliation | Malware Laboratory, Endpoint SecurityTechnology Devel-opment Division, Endpoint Security Planning Group, CanonMarketing Japan In(Canon MJ) |
5th Author's Name | Hiroshi Kitani |
5th Author's Affiliation | Malware Laboratory, Endpoint SecurityTechnology Devel-opment Division, Endpoint Security Planning Group, CanonMarketing Japan In(Canon MJ) |
6th Author's Name | Masakatu Morii |
6th Author's Affiliation | Kobe University(Kobe Univ.) |
Date | 2020-03-02 |
Paper # | ICSS2019-77 |
Volume (vol) | vol.119 |
Number (no) | ICSS-437 |
Page | pp.pp.55-60(ICSS), |
#Pages | 6 |
Date of Issue | 2020-02-24 (ICSS) |