{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:21:51Z","timestamp":1761402111429,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030652982"},{"type":"electronic","value":"9783030652999"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65299-9_2","type":"book-chapter","created":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T13:19:25Z","timestamp":1607433565000},"page":"16-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Detecting Block Cipher Encryption for Defense Against Crypto Ransomware on Low-End Internet of Things"],"prefix":"10.1007","author":[{"given":"Hyunji","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jaehoon","family":"Park","sequence":"additional","affiliation":[]},{"given":"Hyeokdong","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Kyoungbae","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Seung Ju","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Hwajeong","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,9]]},"reference":[{"key":"2_CR1","unstructured":"Mohurle, S., Patil, M.: A brief study of Wannacry threat: Ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 8(5) (2017)"},{"key":"2_CR2","unstructured":"Kharaz, A., Arshad, S., Mulliner, C., Robertson, W., Kirda, E.: UNVEIL: a large-scale, automated approach to detecting ransomware. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 757\u2013772 (2016)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Weckst\u00e9n, M., Frick, J., Sj\u00f6str\u00f6m, A., J\u00e4rpe, E.: A novel method for recovery from Crypto Ransomware infections. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), pp. 1354\u20131358. IEEE (2016)","DOI":"10.1109\/CompComm.2016.7924925"},{"issue":"282","key":"2_CR4","first-page":"87","volume":"116","author":"A Tseng","year":"2016","unstructured":"Tseng, A., Chen, Y., Kao, Y., Lin, T.: Deep learning for ransomware detection. IEICE Tech. Rep. 116(282), 87\u201392 (2016)","journal-title":"IEICE Tech. Rep."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, Velan, K.S., Ganorkar, S.: Evaluating shallow and deep networks for ransomware detection and classification. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 259\u2013265. IEEE (2017)","DOI":"10.1109\/ICACCI.2017.8125850"},{"key":"2_CR6","unstructured":"Poudyal, S., Dasgupta, D., Akhtar, Z., Gupta, K.: A multi-level ransomware detection framework using natural language processing and machine learning. In: 14th International Conference on Malicious and Unwanted Software\" MALCON (2019)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-23644-0_3","volume-title":"Recent Advances in Intrusion Detection","author":"F Gr\u00f6bert","year":"2011","unstructured":"Gr\u00f6bert, F., Willems, C., Holz, T.: Automated identification of cryptographic primitives in binary programs. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 41\u201360. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23644-0_3"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Lestringant, P., Guih\u00e9ry, F., Fouque, P.-A.: Automated identification of cryptographic primitives in binary code with data flow graph isomorphism. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 203\u2013214 (2015)","DOI":"10.1145\/2714576.2714639"},{"key":"2_CR9","unstructured":"Kiraz, M.S., Gen\u00e7, Z.A., \u00d6zt\u00fcrk, E.: Detecting large integer arithmetic for defense against crypto ransomware. Technical report (2017)"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.comnet.2017.09.003","volume":"129","author":"I Yaqoob","year":"2017","unstructured":"Yaqoob, I., et al.: The rise of ransomware and emerging security challenges in the Internet of Things. Comput. Networks 129, 444\u2013458 (2017)","journal-title":"Comput. Networks"},{"issue":"4","key":"2_CR11","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s12652-017-0558-5","volume":"9","author":"A Azmoodeh","year":"2018","unstructured":"Azmoodeh, A., Dehghantanha, A., Conti, M., Choo, K.-K.R.: Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient Intell. Humaniz. Comput. 9(4), 1141\u20131152 (2018)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"1","key":"2_CR12","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TSUSC.2018.2809665","volume":"4","author":"A Azmoodeh","year":"2018","unstructured":"Azmoodeh, A., Dehghantanha, A., Choo, K.-K.R.: Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans. Sustain. Comput. 4(1), 88\u201395 (2018)","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Zahra, A., Shah, M.A.: IoT based ransomware growth rate evaluation and detection using command and control blacklisting. In: 2017 23rd International Conference on Automation and Computing (ICAC), pp. 1\u20136. IEEE (2017)","DOI":"10.23919\/IConAC.2017.8082013"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Karimi, A., Moattar, M.H.: Android ransomware detection using reduced opcode sequence and image similarity. In: 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 229\u2013234. IEEE (2017)","DOI":"10.1109\/ICCKE.2017.8167881"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Kumar, R., Xiaosong, Z., Khan, R.U., Ahad, I., Kumar, J.: Malicious code detection based on image processing using deep learning. In: Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, pp. 81\u201385 (2018)","DOI":"10.1145\/3194452.3194459"},{"key":"2_CR16","unstructured":"Dinu, D., Biryukov, A., Gro\u00dfsch\u00e4dl, J., Khovratovich, D., Le Corre, Y., Perrin, L.: FELICS-fair evaluation of lightweight cryptographic systems. In: NIST Workshop on Lightweight Cryptography, vol. 128 (2015)"},{"key":"2_CR17","unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999)"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-05149-9_1","volume-title":"Information Security Applications","author":"D Hong","year":"2014","unstructured":"Hong, D., Lee, J.-K., Kim, D.-C., Kwon, D., Ryu, K.H., Lee, D.-G.: LEA: a 128-bit block cipher for fast encryption on common processors. In: Kim, Y., Lee, H., Perrig, A. (eds.) WISA 2013. LNCS, vol. 8267, pp. 3\u201327. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05149-9_1"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11894063_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D Hong","year":"2006","unstructured":"Hong, D., et al.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46\u201359. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_4"},{"key":"2_CR20","first-page":"585","volume":"2015","author":"R Beaulieu","year":"2015","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: SIMON and SPECK: Block ciphers for the internet of things. IACR Cryptology ePrint Archive 2015, 585 (2015)","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"8","key":"2_CR21","doi-asserted-by":"publisher","first-page":"4300","DOI":"10.1109\/TSP.2007.896099","volume":"55","author":"JL Williams","year":"2007","unstructured":"Williams, J.L., Fisher, J.W., Willsky, A.S.: Approximate dynamic programming for communication-constrained sensor network management. IEEE Trans. Signal Process. 55(8), 4300\u20134311 (2007)","journal-title":"IEEE Trans. Signal Process."}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65299-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T13:23:53Z","timestamp":1607433833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-65299-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030652982","9783030652999"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65299-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}