Open Access   Article Go Back

Data Recovery from Ransom ware Affected Android Phone using Forensic Tools

P. H. Rughani1

  1. Institute of Forensic Science, Gujarat Forensic Sciences University, Gandhinagar, India.

Correspondence should be addressed to: parag.rughani@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-8 , Page no. 67-70, Aug-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i8.6770

Online published on Aug 30, 2017

Copyright © P. H. Rughani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. H. Rughani, “Data Recovery from Ransom ware Affected Android Phone using Forensic Tools,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.67-70, 2017.

MLA Style Citation: P. H. Rughani "Data Recovery from Ransom ware Affected Android Phone using Forensic Tools." International Journal of Computer Sciences and Engineering 5.8 (2017): 67-70.

APA Style Citation: P. H. Rughani, (2017). Data Recovery from Ransom ware Affected Android Phone using Forensic Tools. International Journal of Computer Sciences and Engineering, 5(8), 67-70.

BibTex Style Citation:
@article{Rughani_2017,
author = {P. H. Rughani},
title = {Data Recovery from Ransom ware Affected Android Phone using Forensic Tools},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2017},
volume = {5},
Issue = {8},
month = {8},
year = {2017},
issn = {2347-2693},
pages = {67-70},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1390},
doi = {https://doi.org/10.26438/ijcse/v5i8.6770}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i8.6770}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1390
TI - Data Recovery from Ransom ware Affected Android Phone using Forensic Tools
T2 - International Journal of Computer Sciences and Engineering
AU - P. H. Rughani
PY - 2017
DA - 2017/08/30
PB - IJCSE, Indore, INDIA
SP - 67-70
IS - 8
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
926 433 downloads 556 downloads
  
  
           

Abstract

With increasing use of computers and mobile phones, malware attacks are also increased in last few years. Ransomware – one of the malware has become the biggest challenge for security experts and end users. There is urgent need to defend computers and smartphones against possible ransomware attacks. However, it may not be possible to stop such attacks, the attempt can be made to recover from such attacks. This paper discusses possibilities to recover data from encrypted files from ransomware affected android phones. The work presented in this paper was carried out to assist forensic investigators and assure end users that there are possible ways to retrieve their data without paying ransom money. It would be encouraging for end users to know that in most of the cases the data encrypted by a ransomware can be retrieved with help of forensic tools and it will be equally discouraging for attackers. The paper is focused on data recovery from ransomware affected android phones.

Key-Words / Index Term

Ransomware, Android Ransomware, Ransomware Forensics, Data Recovery, Malware Forensics, Android Forensics

References

[1] A. Gazet, “Comparative analysis of various ransomware virii”, Journal in computer virology, Vol.6, Issue.1, pp. 77-90, 2010
[2] A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge & E. Kirda, “Cutting the gordian knot: A look under the hood of ransomware attacks”, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Springer International Publishing, pp. 3-24, 2015
[3] N. Andronio, S. Zanero & F. Maggi, “HelDroid: Dissecting and detecting mobile ransomware”, International Workshop on Recent Advances in Intrusion Detection, Springer International Publishing pp. 382-404, 2015
[4] K. Cabaj, P. Gawkowski, K. Grochowski, & D. Osojca, “Network activity analysis of CryptoWall ransomware” Przegląd Elektrotechniczny, Vol.91, Issue.11, pp. 201-204, 2015
[5] N. Scaife, H. Carter, P. Traynor, & K. R. Butler, “Cryptolock (and drop it): stopping ransomware attacks on user data”, Distributed Computing Systems (ICDCS), IEEE 36th International Conference on, IEEE, pp. 303-312, 2016
[6] V. K. Gujare and P. Malviya, "Android Malicious apps and Malware Security: A Review", International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp. 43-47, 2016.
[7] V. Kapoor, "Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.