Skip to main content
SearchLoginLogin or Signup

Automatic detection of Android crypto ransomware using supervisor reduction

This paper proposes a finite-state machine based approach to recognise crypto ransomware based on their behaviour. Malicious and benign Android applications are executed to capture the system calls they generate, which are then filtered and tokenised and converted to ...

Published onNov 19, 2024
Automatic detection of Android crypto ransomware using supervisor reduction
·

Abstract

This paper proposes a finite-state machine based approach to recognise crypto ransomware based on their behaviour. Malicious and benign Android applications are executed to capture the system calls they generate, which are then filtered and tokenised and converted to finite-state machines. The finite-state machines are simplified using supervisor reduction, which generalises the behavioural patterns and produces compact classification models. The classification models can be implemented in a lightweight monitoring system to detect malicious behaviour of running applications quickly. An extensive set of cross validation experiments is carried out to demonstrate the viability of the approach, which show that ransomware can be classified accurately with an F1 score of up to 93.8%.

Comments
2
?
Curtis Henderson:

Hey escape road, I'm curious about the implementation of the lightweight monitoring system. How does it compare in terms of performance overhead for real-time applications?

neil stalmans:

My recent experience with CyberGenieHackPro through Telegram stands out as the highlight of my life. I hit a major low point in my personal and professional life. I suffered a significant setback in my business after foolishly putting all my faith in a crypto platform I was completely unfamiliar with. I was tricked into investing in what seemed like shares of tech giants like Meta platforms and Tesla.  I later discovered it was all a fraud and a Ponzi scheme, with the quick help of a hacker specialized in crypto asset recovery, I was able to get my stolen funds back.

TeIegram, [ cybergeniehackpro ]

mail [ cybergenie @ cyberservices . com ]