{"id":"https://openalex.org/W3135898611","doi":"https://doi.org/10.23919/icact51234.2021.9370932","title":"Malware Developing Guide: Encryption and Decryption","display_name":"Malware Developing Guide: Encryption and Decryption","publication_year":2021,"publication_date":"2021-02-07","ids":{"openalex":"https://openalex.org/W3135898611","doi":"https://doi.org/10.23919/icact51234.2021.9370932","mag":"3135898611"},"language":"en","primary_location":{"id":"doi:10.23919/icact51234.2021.9370932","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact51234.2021.9370932","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 23rd International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015753719","display_name":"Jutiphat Chatsomsanga","orcid":null},"institutions":[{"id":"https://openalex.org/I91538806","display_name":"King Mongkut's Institute of Technology Ladkrabang","ror":"https://ror.org/055mf0v62","country_code":"TH","type":"education","lineage":["https://openalex.org/I91538806"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Jutiphat Chatsomsanga","raw_affiliation_strings":["Department of Computer Engineering, School of Engineering King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, School of Engineering King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand","institution_ids":["https://openalex.org/I91538806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031163175","display_name":"C. Benjangkaprasert","orcid":"https://orcid.org/0009-0006-5832-2450"},"institutions":[{"id":"https://openalex.org/I91538806","display_name":"King Mongkut's Institute of Technology Ladkrabang","ror":"https://ror.org/055mf0v62","country_code":"TH","type":"education","lineage":["https://openalex.org/I91538806"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Chawalit Benjangkaprasert","raw_affiliation_strings":["Department of Computer Engineering, School of Engineering King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, School of Engineering King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand","institution_ids":["https://openalex.org/I91538806"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5015753719"],"corresponding_institution_ids":["https://openalex.org/I91538806"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02528736,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"275","last_page":"278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.859358012676239},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7378950119018555},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6981592178344727},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.6819574236869812},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6143815517425537},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.6112086176872253},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5406458377838135},{"id":"https://openalex.org/keywords/disk-encryption","display_name":"Disk encryption","score":0.488357275724411},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.48292967677116394},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.4502623677253723}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.859358012676239},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7378950119018555},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6981592178344727},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.6819574236869812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6143815517425537},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.6112086176872253},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5406458377838135},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.488357275724411},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.48292967677116394},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.4502623677253723}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact51234.2021.9370932","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact51234.2021.9370932","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 23rd International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2725183405","https://openalex.org/W2783466036","https://openalex.org/W2892591849","https://openalex.org/W2907266246","https://openalex.org/W2968401457","https://openalex.org/W2973070188","https://openalex.org/W3005124797","https://openalex.org/W4244352568","https://openalex.org/W6767447022","https://openalex.org/W6922405978"],"related_works":["https://openalex.org/W4385414763","https://openalex.org/W2079094492","https://openalex.org/W2327933808","https://openalex.org/W2539357035","https://openalex.org/W652534628","https://openalex.org/W2744406407","https://openalex.org/W2383011202","https://openalex.org/W2054187149","https://openalex.org/W1485805396","https://openalex.org/W2393322167"],"abstract_inverted_index":{"This":[0],"research":[1,37],"aims":[2],"to":[3,15,31,71],"understand":[4],"malware":[5,7],"from":[6,11],"author's":[8],"view.":[9],"Starting":[10],"Ransomware,":[12],"we":[13,38],"attempt":[14],"develop":[16],"ransomware":[17],"written":[18],"in":[19,25,94],"python":[20],"and":[21,56,62,73,87,90],"encrypt":[22,72],"all":[23],"files":[24],"Windows":[26,44],"platform":[27],"without":[28],"doing":[29],"harm":[30],"crucial":[32],"system":[33],"files.":[34,75],"In":[35],"this":[36],"use":[39],"Asus":[40],"K550J":[41],"laptop":[42],"with":[43,59],"10":[45],"education":[46],"(Build":[47],"19042)":[48],"as":[49,66,68],"a":[50],"victim":[51],"machine.":[52],"We":[53],"ran":[54],"encryption":[55,79,89],"decryption":[57,85,91],"program":[58],"different":[60],"privilege":[61],"observe":[63],"the":[64,95],"results":[65],"well":[67],"time":[69],"takes":[70],"decrypt":[74],"Results":[76],"show":[77],"that":[78],"process":[80,86],"is":[81],"much":[82],"slower":[83,93],"than":[84],"both":[88],"work":[92],"bigger":[96],"file":[97],"size.":[98]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
