Profil

GENÇ Ziya Alper

Main Referenced Co-authors
LENZINI, Gabriele  (12)
RYAN, Peter Y A  (7)
Sgandurra, Daniele (4)
Kardaş, Süleyman (3)
VAZQUEZ SANDOVAL, Itzel  (2)
Main Referenced Keywords
ransomware (6); Ransomware (5); malware (3); detection (2); evasion (2);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA) (10)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Other (3)
EU's Horizon 2020 Research and Innovation Programme (1)
TÜBİTAK BİLGEM UEKAE (1)
Main Referenced Disciplines
Computer science (18)

Publications (total 18)

The most downloaded
2061 downloads
Genç, Z. A. (2020). Analysis, Detection, and Prevention of Cryptographic Ransomware [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/44662 https://hdl.handle.net/10993/44662

The most cited

21 citations (Scopus®)

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. In Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer. doi:10.1007/978-3-319-93411-2_11 https://hdl.handle.net/10993/35679

Genç, Z. A., Lenzini, G., & Sgandurra, D. (February 2021). Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs. Digital Threats: Research and Practice, 2 (1). doi:10.1145/3431286
Peer reviewed

Genç, Z. A. (2020). Analysis, Detection, and Prevention of Cryptographic Ransomware [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/44662

Genç, Z. A., & Lenzini, G. (2020). Dual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (pp. 585-592). Setúbal, Portugal: SciTePress. doi:10.5220/0009000505850592
Peer reviewed

Genç, Z. A., Iovino, V., & Rial, A. (2020). "The Simplest Protocol for Oblivious Transfer'' Revisited. Information Processing Letters. doi:10.1016/j.ipl.2020.105975
Peer Reviewed verified by ORBi

Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2019). A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. In Information Systems Security and Privacy (pp. 125-151). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-25109-3_7
Peer reviewed

Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). A Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs. In Proceedings of the 35th Annual Computer Security Applications Conference (pp. 456-465). New York, United States: ACM. doi:10.1145/3359789.3359844
Peer reviewed

Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). On Deception-Based Protection Against Cryptographic Ransomware. In Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (pp. 219-239). Cham, Switzerland: Springer. doi:10.1007/978-3-030-22038-9_11
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2019). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. In Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (pp. 69-85). Cham, Switzerland: Springer. doi:10.1007/978-3-030-39749-4_5
Peer reviewed

Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. In Proceedings of the Third Central European Cybersecurity Conference. New York, United States: ACM. doi:10.1145/3360664.3360673
Peer reviewed

Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. In Proceedings of the 4th International Conference on Information Systems Security and Privacy. doi:10.5220/0006609100830095
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. In Advances in Cybersecurity 2018.
Peer reviewed

Genç, Z. A. (2018). Crypren Decryptor.

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. In Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer. doi:10.1007/978-3-319-93411-2_11
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Next Generation Cryptographic Ransomware. In Proceedings of the Secure IT Systems (pp. 385-401). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-030-03638-6_24
Peer reviewed

Kardaş, S., & Genç, Z. A. (2018). Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols. Wireless Personal Communications, 98 (1), 1135-1154. doi:10.1007/s11277-017-4912-x
Peer Reviewed verified by ORBi

Genç, Z. A., Kardaş, S., & Kiraz. (2017). Examination of a New Defense Mechanism: Honeywords. In Proceedings of the 11th WISTP International Conference on Information Security Theory and Practice. Springer.
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. In Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press.
Peer reviewed

Kiraz, M. S., Genç, Z. A., & Kardaş, S. (21 August 2015). Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer. Security and Communication Networks, 8 (18), 4123-4135. doi:10.1002/sec.1329
Peer reviewed

Contact ORBilu