Workshop on Measurement and Networking (M N),
pages 1–6.
Catuogno, L., Galdi, C., and Pasquino, N. (2018). An effec-
tive methodology for measuring software resource us-
age. IEEE Transactions on Instrumentation and Mea-
surement, 67(10):2487–2494.
Chen, P. M. and Noble, B. D. (2001). When virtual is better
than real [operating system relocation to virtual ma-
chines]. In Proceedings Eighth Workshop on Hot Top-
ics in Operating Systems, pages 133–138.
Chronicle (2021). Virustotal community. https://www.
virustotal.com.
Claudio Guarnieri, e. a. (2011). Cuckoo sandbox web page.
https://cuckoosandbox.org.
Cochran, W. G. (1952). The χ2 test of goodness of fit. The
Annals of Mathematical Statistics, pages 315–345.
Continella, A., Guagnelli, A., Zingaro, G., De Pasquale,
G., Barenghi, A., Zanero, S., and Maggi, F. (2016).
ShieldFS: a self-healing, ransomware-aware filesys-
tem. In Proceedings of the 32nd Annual Conference
on Computer Security Applications, pages 336–347.
ACM.
Continella, A., Guagnelli, A., Zingaro, G., De Pasquale,
G., Barenghi, A., Zanero, S., and Maggi, F. (2018).
Shieldfs website. http://shieldfs.necst.it/.
Corvus Forensics (2021). Virusshare repository. https://
virusshare.com.
Demme, J., Maycock, M., Schmitz, J., Tang, A., Waksman,
A., Sethumadhavan, S., and Stolfo, S. (2013). On
the feasibility of online malware detection with per-
formance counters. In ACM SIGARCH Computer Ar-
chitecture News, volume 41, pages 559–570. ACM.
Digital Corpora Initiative (2009). Corpora. http://
digitalcorpora.org/corpora/.
Don Capps et al. (2002). IOZone file system benchmark.
http://www.iozone.org/.
Faghihi, F. and Zulkernine, M. (2021). Ransomcare:
Data-centric detection and mitigation against smart-
phone crypto-ransomware. Computer Networks,
191:108011.
Garfinkel, S., Farrell, P., Roussev, V., and Dinolt, G. (2009).
Bringing science to digital forensics with standardized
forensic corpora. digital investigation, 6:S2–S11.
Garfinkel, T. and Rosenblum, M. (2003). A virtual machine
introspection based architecture for intrusion detec-
tion. In Proceedings of the Network and Distributed
System Security Symposium, NDSS 2003, San Diego,
California, USA. The Internet Society.
Gaspari, F. D., Hitaj, D., Pagnotta, G., Carli, L. D., and
Mancini, L. V. (2020). The naked sun: Malicious
cooperation between benign-looking processes. In
Conti, M., Zhou, J., Casalicchio, E., and Spognardi,
A., editors, Applied Cryptography and Network Se-
curity - 18th International Conference, ACNS 2020,
Rome, Italy, October 19-22, 2020, Proceedings, Part
II, volume 12147 of Lecture Notes in Computer Sci-
ence, pages 254–274. Springer.
Gaspari, F. D., Hitaj, D., Pagnotta, G., Carli, L. D., and
Mancini, L. V. (2021). Reliable detection of com-
pressed and encrypted data. CoRR, abs/2103.17059.
GmbH, H. A. (2018). A generic interface and CLI for all
endpoints of the Falcon Sandbox API. https://github.
com/PayloadSecurity/VxAPI.
G
´
omez-Hern
´
andez, J.,
´
Alvarez-Gonz
´
alez, L., and Garc
´
ıa-
Teodoro, P. (2018). R-Locker: Thwarting ransomware
action through a honeyfile-based approach. Comput-
ers & Security, 73:389–398.
Google Inc. (201x). Android fileobserver. https://developer.
android.com/reference/android/os/FileObserver.
Gutierrez, C. N., Spafford, E. H., Bagchi, S., and Yurek,
T. (2018). Reactive redundancy for data destruction
protection (R2D2). Computers & Security.
Hicks, B. J., Dong, A., Palmer, R., and Mcalpine, H. C.
(2008). Organizing and managing personal elec-
tronic files: A mechanical engineer’s perspective.
ACM Transactions on Information Systems (TOIS),
26(4):23.
Huang, J., Xu, J., Xing, X., Liu, P., and Qureshi, M. K.
(2017). Flashguard: Leveraging intrinsic flash prop-
erties to defend against encryption ransomware. In
Proceedings of the 2017 ACM SIGSAC Conference
on Computer and Communications Security, pages
2231–2244. ACM.
Hybrid Analysis GmbH (2018). Hybrid analyisis. https:
//www.hybrid-analysis.com.
Kharraz, A., Arshad, S., Mulliner, C., Robertson, W., and
Kirda, E. (2016). UNVEIL: A Large-Scale, Auto-
mated Approach to Detecting Ransomware. In 25th
USENIX Security Symposium (USENIX Security 16),
pages 757–772. USENIX Association.
Kharraz, A. and Kirda, E. (2017). Redemption: Real-time
protection against ransomware at end-hosts. In In-
ternational Symposium on Research in Attacks, Intru-
sions, and Defenses, pages 98–119. Springer.
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., and
Kirda, E. (2015). Cutting the gordian knot: A look un-
der the hood of ransomware attacks. In International
Conference on Detection of Intrusions and Malware,
and Vulnerability Assessment, pages 3–24. Springer.
Kohlbrenner, A., Araujo, F., Taylor, T., and Stoecklin,
M. P. (2017). POSTER: Hidden in plain sight: A
filesystem for data integrity and confidentiality. In
Proceedings of the 2017 ACM SIGSAC Conference
on Computer and Communications Security, pages
2523–2525. ACM.
Kolodenker, E., Koch, W., Stringhini, G., and Egele, M.
(2017a). Paybreak: Defense against cryptographic
ransomware. In Proceedings of the 2017 ACM on Asia
Conference on Computer and Communications Secu-
rity, pages 599–611. ACM.
Kolodenker, E., William, K., Gianluca, S., and Manuel, E.
(2017b). Real-time Automation to Discover, Detect
and Alert of Ransomware (RADDAR). https://github.
com/BUseclab/raddar.
Kullback, S. and Leibler, R. A. (1951). On information and
sufficiency. Ann. Math. Statist., 22(1):79–86.
Le, T. (2015). A recommended framework for anomaly in-
trusion detection system (ids). In GI-Jahrestagung,
pages 1829–1840.
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
218