Now 106 visitors
Today:1031 Yesterday:1624
Total: 2023 241S 57P 13R
2025-11-05, Week 45
TACT Journal Page
Call for Paper
Author Homepage
Paper Procedure
Paper Submission
Registration
Welcome Message
Statistics
Committee
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
FAQ
Member Login
Scheduler Login
Seminar
Archives Login
Sponsors




















Work Method
*** Looking though a Presenation Sample (click!!) as the target.
Step.1: Submit a slide (select slide number + upload .jpg + description) + Write button (Save)
Step.2: Review a submitted sile with .jpg and description, and listen text to speech function
Step.3: Any time, edit it by selecting the slide hyper link on top a slide + Write button (Save)
Let's give it a try right away!!

Paper Number
Paper Title
Keyword
On-line Presentation ** Submit YouTube URL
Slide Number *** Upload slide selecting .jpg surfix file here -> slide 11.jpg  
** Min. 20 ~ Max. 40 slides!!
Slide Display
Verbal Description
**Must fill up in details
Save the slide and description

* You can edit any slide by selecting the Slide # below, edit anything, and then 'Write' button (Save)
ICACT20210206 Slide.21        [Big slide for presentation]       Chrome Text-to-Speach Click!!
Thank you very much for your kind attention. Are there any question and comments?

ICACT20210206 Slide.20        [Big slide for presentation]       Chrome Text-to-Speach Click!!
In the near future, researchers aim to do 3 more thing first is to leverage DLL to increase memory efficiency which can make the encryption program become faster and stealthier. Second researchers will try other symmetric key encryption and compare their efficiency to select the best algorithm for encryption and decryption last researcher will develop other part of ransomware such as the privilege escalation part, make it run automatically without the need of user interaction.

ICACT20210206 Slide.19        [Big slide for presentation]       Chrome Text-to-Speach Click!!
Conclusions. This encryption program was not detected by most anti-virus but it is slow. Encrypting all files in the computer at administrator and user privilege does not damage crucial Windows file but for ransomware, it should encrypt only important file extensions or encrypt based on user¡¯s directory for more speed.

ICACT20210206 Slide.18        [Big slide for presentation]       Chrome Text-to-Speach Click!!
This is the plotted result of the encryption speed and decryption speed of different file size under 1GB start from 102.4 MB scaling up linearly to 1024 MB you will see that encryption speed is slower and is degraded faster than of decryption speed.

ICACT20210206 Slide.17        [Big slide for presentation]       Chrome Text-to-Speach Click!!
As you can see the decryption speed is more than 3 times faster than encryption speed.

ICACT20210206 Slide.16        [Big slide for presentation]       Chrome Text-to-Speach Click!!
However researchers also generate 1.00 GB all zeroes files and compare speed of encryption and decryption this is how researchers had generate 1 GB all-zeros file. And this is the result.

ICACT20210206 Slide.15        [Big slide for presentation]       Chrome Text-to-Speach Click!!
Next, about the speed. Speed of encryption program is 2.873 MB/s and decryption program is 24.57 MB/s but the total file size processed by decryption program is bigger because the original file will be expanded during encryption around 33% because it uses base 64 encoding as a part of an encryption program.

ICACT20210206 Slide.14        [Big slide for presentation]       Chrome Text-to-Speach Click!!
These 2 screenshots from target computer show that during encryption program the encryption program uses very high resources from target computer rendered target computer slow. In other words if this is the real ransomware victim will know that there¡¯s something wrong with their computer(s).

ICACT20210206 Slide.13        [Big slide for presentation]       Chrome Text-to-Speach Click!!
Encryption and decryption programs are detected only 2 out of 72 antivirus engines as malicious. The engines that detect both programs as malicious are Secure age apex and Cynet.

ICACT20210206 Slide.12        [Big slide for presentation]       Chrome Text-to-Speach Click!!
After convert from python file to .exe file researchers upload .exe files. Researchers upload .exe files of encryption and decryption program to VirusTotal. Virustotal is an online platform to analyze the virus. Any file uploaded to VirusTotal will be scanned with more than 70 anti virus engines. The results of both encryption and decryption are the same.

ICACT20210206 Slide.11        [Big slide for presentation]       Chrome Text-to-Speach Click!!
Next is the results of the experiment I will cover 3 things which are anti-virus detection computational resource usage and speed.

ICACT20210206 Slide.10        [Big slide for presentation]       Chrome Text-to-Speach Click!!
Next we run an encryption program on the target computer. This is the specification of the target computer. While encryption and decryption program was running the windows defender and window firewall were active.

ICACT20210206 Slide.09        [Big slide for presentation]       Chrome Text-to-Speach Click!!
After finished writing code. The program is converted to .exe file so it can be run on any windows OS without the prior need to install python interpreter in the machine.

ICACT20210206 Slide.08        [Big slide for presentation]       Chrome Text-to-Speach Click!!
Decryption process is more simple than encryption process it just check if the file has .weep extension or not if any file is of .weep extension this program will decrypt that file. After decryption process is done. The program will delete .weep extension from that file. Make the file usable again.

ICACT20210206 Slide.07        [Big slide for presentation]       Chrome Text-to-Speach Click!!
Next researcher will explain encryption and decryption program in flowchart. Encryption program starts from do Emergency break function. It is run single time make sure the computer running encryption program is not the researcher¡¯s by compare the hash of researcher¡¯s computer name with predefined hash value because researchers don¡¯t want their computers to be encrypted. Next find main drive with echo %Systemroot% command. Next generate drives list the name of windows drives can be only a-z letter only so this program list it out and do encryption for all drives except maindrive. Next the program then recursively encrypt all file in file list generated by os.walk command but only encrypt files that smaller than 1 GB in size for more speed. After the encryption process is finished the program will append .weep as a encrypted file extension this helps decryption know which file was encrypted and need to be decrypted. After encrypt all file in every drives except maindrive the program then encrypt main drive but not /Windows folder and the processes in green rectangle are repeated.

ICACT20210206 Slide.06        [Big slide for presentation]       Chrome Text-to-Speach Click!!
From the question how to encrypt without damaging Windows OS itself. Researchers choose to omit main drive/Windows because it is where critical files for windows OS reside.

ICACT20210206 Slide.05        [Big slide for presentation]       Chrome Text-to-Speach Click!!
This slide will talk about encryption and decryption program design. Researchers developed this encryption and decryption program by using python 3.9. The 3 main part of the design are first cryptography version 3.3.1 library. In this library researchers use AES-128 as an algorithm for encryption and decryption because it is considered fast and secure encryption algorithm. second is os.walk() command researchers use this command to list all file path in target computer to encrypt and decrypt it. Last is the python library called pyinstaller. Researchers use pyinstaller to convert python file to .exe file.

ICACT20210206 Slide.04        [Big slide for presentation]       Chrome Text-to-Speach Click!!
Next, is about how researchers planned an experiment. First researchers wrote and decryption and decryption program. Second tested encryption program and decryption program against antivirus by using VirusTotal Service. Next researchers run an encryption and decryption programs on target computer last researchers observe its behavior and collect the experiment results.

ICACT20210206 Slide.03        [Big slide for presentation]       Chrome Text-to-Speach Click!!
First let me talk about the research background. Researchers want to know how malwares are created from the malware author¡¯s view therefore, researchers research papers about malware analysis and decided to attempt to develop malware. Starting with malware¡¯s encryption and decryption part.

ICACT20210206 Slide.02        [Big slide for presentation]       Chrome Text-to-Speach Click!!
I have divided this presentation into 7 parts as follows. First is research background. Second is experiment method. Third is encryption and decryption program. Fourth is target computer. Fifth is the experimental result. Sixth is the conclusion. And finally is future works.

ICACT20210206 Slide.01        [Big slide for presentation]       Chrome Text-to-Speach Click!!
Hi everybody, my name is Chawalit Benjangkaprasert from King Mongkut¡¯s Institute of Technology Ladkrabang, THALAND. My presentation topic for today is Malware developing guide : encryption and Decryption.