Acknowledgement
본 논문은 과학기술정보통신부의 재원으로 정보통신기획평가원(IITP)의 국방ICT융합연구(Project No. 2022-11220701, 50%), 정보통신방송기술 국제공동연구(Project No. RS-2022-00165794, 30%), 대학ICT연구센터사업(ITRC) 실감콘텐츠핵심기술개발(Project No. RS-2023-00228996, 20%)의 지원을 받아 수행된 연구임.
References
- Distribution of mobile malware worldwide in 2nd quarter 2023 and 1st quarter 2024, by type
- Share of infected organizations worldwide agreeing to pay ransom from 2021 to 2023
- Ehringer, David. "The dalvik virtual machine architecture." Techn. report (March 2010) 4.8 (2010): 72.
- Fernandez-Fuentes, X., F. Pena, T., Cabaleiro, J.C., Recovering from Memory the Encryption Keys Used by Ransomware Targeting Windows and Linux Systems, SAI : Intelligent Computing, London, United Kingdom, 2024, 1149-1166
- S. Kang, S. Lee, S. Kim, D. Kim, K. Kim, and J. Kim, "A Study on Decryption of Files Infected by Ragnar Locker Ransomware through Key Reuse Attack and Its Applications," Journal of the Korea Institute of Information Security & Cryptology, vol. 31, no. 2, pp. 221-231, 2021.
- MalwareBazzar : Malware dataset (n.d.), https://bazaar.abuse.ch
- dex2jar, https://github.com/pxb1988/dex2jar
- jda-gui, https://java-decompiler.github.io
- apktool, https://apktool.org