Reference : Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/36627
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware
English
Genç, Ziya Alper mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Lenzini, Gabriele mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Ryan, Peter [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
2018
Advances in Cybersecurity 2018
Yes
No
International
Central European Cybersecurity Conference
15–16 November 2018
[en] ransomware ; key acquiring ; security analysis ; malware
[en] To achieve its goals, ransomware needs to employ strong encryption, which in turn requires access to high-grade encryption keys. Over the evolution of ransomware, various techniques have been observed to accomplish the latter. Understanding the advantages and disadvantages of each method is essential to develop robust defense strategies. In this paper we explain the techniques used by ransomware to derive encryption keys and analyze the security of each approach. We argue that recovery of data might be possible if the ransomware cannot access high entropy randomness sources. As an evidence to support our theoretical results, we provide a decryptor program for a previously undefeated ransomware.
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA)
Fonds National de la Recherche - FnR
Researchers ; Professionals ; Students ; General public
http://hdl.handle.net/10993/36627
FnR ; FNR12536861 > Gabriele Lenzini > NoCry > No more Cryptographic Ransomware > 15/05/2018 > 14/09/2018 > 2018

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
glr2018.pdfAuthor postprint494.47 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.