![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (February 2021). Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs. Digital Threats: Research and Practice, 2 (1). doi:10.1145/3431286 ![]() |
![]() ![]() | GENÇ, Z. A. (2020). Analysis, Detection, and Prevention of Cryptographic Ransomware [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/44662 |
![]() ![]() | GENÇ, Z. A., & LENZINI, G. (2020). Dual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (pp. 585-592). Setúbal, Portugal: SciTePress. doi:10.5220/0009000505850592 ![]() |
![]() ![]() | GENÇ, Z. A., Iovino, V., & RIAL, A. (2020). "The Simplest Protocol for Oblivious Transfer'' Revisited. Information Processing Letters. doi:10.1016/j.ipl.2020.105975 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., RYAN, P., & VAZQUEZ SANDOVAL, I. (2019). A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. In Information Systems Security and Privacy (pp. 125-151). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-25109-3_7 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). A Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs. In Proceedings of the 35th Annual Computer Security Applications Conference (pp. 456-465). New York, United States: ACM. doi:10.1145/3359789.3359844 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). On Deception-Based Protection Against Cryptographic Ransomware. In Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (pp. 219-239). Cham, Switzerland: Springer. doi:10.1007/978-3-030-22038-9_11 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2019). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. In Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (pp. 69-85). Cham, Switzerland: Springer. doi:10.1007/978-3-030-39749-4_5 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. In Proceedings of the Third Central European Cybersecurity Conference. New York, United States: ACM. doi:10.1145/3360664.3360673 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., RYAN, P., & VAZQUEZ SANDOVAL, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. In Proceedings of the 4th International Conference on Information Systems Security and Privacy. doi:10.5220/0006609100830095 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. In Advances in Cybersecurity 2018. ![]() |
GENÇ, Z. A. (2018). Crypren Decryptor. |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. In Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer. doi:10.1007/978-3-319-93411-2_11 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). Next Generation Cryptographic Ransomware. In Proceedings of the Secure IT Systems (pp. 385-401). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-030-03638-6_24 ![]() |
![]() ![]() | Kardaş, S., & GENÇ, Z. A. (2018). Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols. Wireless Personal Communications, 98 (1), 1135-1154. doi:10.1007/s11277-017-4912-x ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. In Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press. ![]() |
![]() ![]() | GENÇ, Z. A., Kardaş, S., & Kiraz. (2017). Examination of a New Defense Mechanism: Honeywords. In Proceedings of the 11th WISTP International Conference on Information Security Theory and Practice. Springer. ![]() |
![]() ![]() | Kiraz, M. S., GENÇ, Z. A., & Kardaş, S. (21 August 2015). Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer. Security and Communication Networks, 8 (18), 4123-4135. doi:10.1002/sec.1329 ![]() |