Filters








18 Hits in 0.92 sec

Cryptovirology: extortion-based security threats and countermeasures

A. Young, Moti Yung
Proceedings 1996 IEEE Symposium on Security and Privacy  
By being o ensive w e mean that it can be used to mount extortion based attacks that cause loss of access to information, loss of con dentiality, and information leakage, tasks which cryptography t ypically  ...  We also suggest countermeasures and mechanisms to cope with and prevent such attacks.  ...  Acknowledgements: The rst author would like to thank Mark Reed and Stephen Clausing for their in uence on his career, and Matt Blaze for a security course where some of the material used in this work was  ... 
doi:10.1109/secpri.1996.502676 dblp:conf/sp/YoungY96 fatcat:v3ht5m7mubanlgkea6qlvgbkjy

Cryptovirology: Virus Approach

Shivale Saurabh Anandrao
2011 International journal of network security and its applications  
Public-key cryptography is very essential for the attacks that based on cryptovirology. This paper also suggest some of the countermeasures, mechanisms to cope with and prevent such attacks.  ...  Being offensive means, it can be used to mount extortion based attacks that cause loss of access to information, loss of confidentiality, and information leakage, tasks which cryptography usually prevents  ...  Acknowledgement I am thankful to Management of Vishwakarma Institute of Information Technology, Pune and all my faculty members of Computer Engineering Department for their encouragement and whole hearted  ... 
doi:10.5121/ijnsa.2011.3404 fatcat:erdx5ynlbjdz3djgdndtf2ld4y

White-box attack context cryptovirology

Sébastien Josse
2008 Journal in Computer Virology  
Use of symmetric and asymmetric cryptography by viruses has been popularized by polymorphic viruses and cryptoviruses. The latter are specialized in extorsion.  ...  These mechanisms can be misappropriated and used for the purpose of doing extorsion. We evaluate these new cryptographic primitives and discuss their (mis)use in a viral context.  ...  The victim must transmit K pub [K ] and the extorted amount of money to the virus author.  ... 
doi:10.1007/s11416-008-0097-x fatcat:hsp2h732bnbevhjdg2t64po7vy

CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES
КРИПТОВІРОЛОГІЯ: ЗАГРОЗИ БЕЗПЕКИ ГАРАНТОЗДАТНИМ ІНФОРМАЦІЙНИМ СИСТЕМАМ І ЗАХОДИ ПРОТИДІЇ ШИФРУВАЛЬНИМ ВІРУСАМ

Hennadii Hulak, Volodymyr Buriachok, Pavlo Skladannyi, Lydia Kuzmenko
2020 Cybersecurity: Education, Science, Technique  
This paper examines the security threats to guaranteed information systems, as well as measures to combat encryption viruses.  ...  encrypted programs - data seekers is to create a special software security monitor and build specialized multiprocessor systems to implement cryptanalysis methods with wide access of authorized users.  ...  Yung Cryptovirology: extortion-based security threats and countermeasures, Published in: Proceedings 1996 IEEE Symposium on Security and Privacy, 6-8 May 1996, Oakland, CA, USA, Publisher: IEEE DOI: 10.1109  ... 
doi:10.28925/2663-4023.2020.10.628 fatcat:kn4k3emsvjfuhfc7z7irv7i7xu

Malware Cryptovirology Attacks in the Framework

Soumen Chakraborty
2017 International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2017 IJSRCSEIT   unpublished
Public-key cryptography could be very essential for the attacks that based totally on cryptovirology.  ...  This paper additionally suggests a few of the countermeasures, mechanisms to cope with and prevent such assaults.  ...  , increasing permeability of firewalls and incredibly asymmetric nature of threats new cryptoviruses.  ... 
fatcat:anhbg24jkndj3gpcyqrcaosf7y

Ransomware a Concealed Weapon of Cyber Extortion: The Beginning Unfolded

Haitham Hilal Al Hajri, Badar Mohammed Al Mughairi, Asif Mahbub Karim, Md. Nasiruzzaman, Mohammad Imtiaz Hossain
2019 International Journal of Academic Research in Business and Social Sciences  
This paper will also highlight the evaluation of the malware known as ransomware and how it has become a global threat, Additionally to recommend on how to stay protected against such threat.  ...  However, cybercriminals have found new grounds to explore potential abuse and misuse, where they have merged and resurrected legacy threats to be implemented on modern tech.  ...  The researches have detailed the proof on concept method in their paper titled: Cryptovirology: Extortion-Based Security Threats and Countermeasures (Micro, 2016) .  ... 
doi:10.6007/ijarbss/v9-i7/6190 fatcat:5tvmzkc7gbhnxjwc2rrs656oti

Comparative analysis of various ransomware virii

Alexandre Gazet
2008 Journal in Computer Virology  
Security related media and some antivirus vendors quickly brandished this "new" type of virii as a major threat for computer world.  ...  Our analysis leads us to many interesting approaches and conclusions concerning this phenomenon, and in particular the strength and weakness of used extortion means.  ...  In a paper called "Cryptovirology: Extortion-based security threats and countermeasures", they simply introduce their talks with these words: "In this paper we present the idea of Cryptovirology, […]  ... 
doi:10.1007/s11416-008-0092-2 fatcat:6oljbbfztzd73i6xkamvux7miq

A Survey on Ransomware Malware and Ransomware Detection Techniques

Sonal Yadav
2022 International Journal for Research in Applied Science and Engineering Technology  
Keywords: Network Security, Malware, Ransomware, Ransomware Detection Techniques  ...  Presently days and assailants executed new strategies for effective working of assault.  ...  Outer and Internal Threats Security threats can come from two locations: 1) Outer users 2) Inside users An outer security danger happens when somebody outside your organization makes a security danger  ... 
doi:10.22214/ijraset.2022.39787 fatcat:a2tpa527ynci7p7eyr74xaga6y

Deep Learning Based Cryptographic Primitive Classification [article]

Gregory D. Hill, Xavier J. A. Bellekens
2017 arXiv   pre-print
Cryptovirological augmentations present an immediate, incomparable threat.  ...  Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike.  ...  INTRODUCTION T HE idea of cryptovirology was first introduced by [1] to describe the offensive nature of cryptography for extortion-based security threats.  ... 
arXiv:1709.08385v1 fatcat:pze2f23objeybjwk53fih4c6wi

CryptoKnight: Generating and Modelling Compiled Cryptographic Primitives

Gregory Hill, Xavier Bellekens
2018 Information  
Cryptovirological augmentations present an immediate, incomparable threat.  ...  To rival the size and variability of equivalent datasets, and to adequately train our model without risking adverse exposure, a methodology for the procedural generation of synthetic cryptographic binaries  ...  Introduction The idea of cryptovirology was first introduced by Young and Yung [1] to describe the offensive nature of cryptography for extortion-based security threats.  ... 
doi:10.3390/info9090231 fatcat:r6cslfcvgjb2perq7eggt67zji

CRYPTOVIRAL EXTORTION

Nidhi Mishra, Shubhi Haseeja
International Journal of Innovations & Advancement in Computer Science   unpublished
It is used to provide confidentiality, integrity, authentication and security to data. This paper presents the idea of cryptovirology which really an opposite side of the cryptography.  ...  It describes a less prominent attack on standalone and networked computer systems known as Cryptoviral attacks .This paper also suggests some of the countermeasures, mechanisms to cope with and prevent  ...  Historians say that the first attack in the field of cryptovirology involved cryptoviral extortion [4] .  ... 
fatcat:mcr433nuojfjllczszsqdlzjse

ZombieCoin: Powering Next-Generation Botnets with Bitcoin [chapter]

Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao
2015 Lecture Notes in Computer Science  
Botnets are the preeminent source of online crime and arguably the greatest threat to the Internet infrastructure.  ...  We believe this is a desirable avenue botmasters may explore in the near future and our work is intended as a first step towards devising effective countermeasures.  ...  , information theft and extortion [2] .  ... 
doi:10.1007/978-3-662-48051-9_3 fatcat:oqxbppacnvgsnbw5onfrr32wpa

Cyber operational risk scenarios for insurance companies

R. Egan, S. Cartagena, R. Mohamed, V. Gosrani, J. Grewal, M. Acharyya, A. Dee, R. Bajaj, V.-J. Jaeger, D. Katz, P. Meghen, M. Silley (+4 others)
2019 British Actuarial Journal  
Not least that the threat landscape is ever changing and there is a lack of historical experience to base assumptions off.  ...  influencing internal cyber security capabilities.  ...  Acknowledgements The authors would like to thank Jonathan Evans, Patrick Kelliher, and Edward Pocock for their invaluable feedback as well as the IFoA staff for their continued support and assistance.  ... 
doi:10.1017/s1357321718000284 fatcat:h7loosxihfe4xmk2a326p55mum

ZombieCoin 2.0: managing next-generation botnets using Bitcoin

Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao
2017 International Journal of Information Security  
We hope our study provides a useful first step towards devising effective countermeasures for this threat.  ...  Abstract Botnets are the preeminent source of online crime and arguably one of the greatest threats to the Internet infrastructure.  ...  The authors thank Hassaan Bashir, Mike Hearn, Pawel Widera, and Siamak Shahandashti for invaluable assistance with experiments and helpful comments.  ... 
doi:10.1007/s10207-017-0379-8 fatcat:lswmaw42szb2tktok4jmdrem2i

ESTUDIO EXPLORATORIO DE LAS ESTRATEGIAS PARA LA PROTECCIÓN A LAS REDES EMPRESARIALES DE LAS INFECCIONES RANSOMWARE

Danny Vivanco-Toala, Francisco Bolaños-Burgos, Navira Angulo-Murillo
2020 REVISTA CIENTÍFICA MULTIDISCIPLINARIA ARBITRADA "YACHASUN"  
Cryptovirology: Extortion- Based Security Threats and Countermeasures. IEEE Symposium on Security and Privacy, 13.  ...  A Socio-technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks. Applied Clinical Informatics. Symantec. (2016). Internet Security Threat Report.  ... 
doi:10.46296/yc.v4i7.0035 fatcat:fi2x2opikfcpzfiffvbz2zhcu4
« Previous Showing results 1 — 15 out of 18 results