[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Genç et al., 2018 - Google Patents

No random, no ransom: a key to stop cryptographic ransomware

Genç et al., 2018

View PDF
Document ID
12947848556865462667
Author
Genç Z
Lenzini G
Ryan P
Publication year
Publication venue
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings 15

External Links

Snippet

To be effective, ransomware has to implement strong encryption, and strong encryption in turn requires a good source of random numbers. Without access to true randomness, ransomware relies on the pseudo random number generators that modern Operating …
Continue reading at orbilu.uni.lu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Genç et al. No random, no ransom: a key to stop cryptographic ransomware
Bhat et al. A survey on various threats and current state of security in android platform
Modi et al. A survey on security issues and solutions at different layers of Cloud computing
Kolodenker et al. Paybreak: Defense against cryptographic ransomware
Zavarsky et al. Experimental analysis of ransomware on windows and android platforms: Evolution and characterization
Khan A survey of security issues for cloud computing
Islam et al. A classification and characterization of security threats in cloud computing
Lu et al. Blade: an attack-agnostic approach for preventing drive-by malware infections
US7743260B2 (en) Firewall+storage apparatus, method and system
US8474032B2 (en) Firewall+ storage apparatus, method and system
Irazoqui et al. Know thy neighbor: Crypto library detection in cloud
Sood et al. An empirical study of HTTP-based financial botnets
Xu et al. Data-provenance verification for secure hosts
Lee et al. Ransomware prevention technique using key backup
Huber et al. The lazarus effect: Healing compromised devices in the internet of small things
Ibarra et al. Ransomware impact to SCADA systems and its scope to critical infrastructure
Song et al. Impeding Automated Malware Analysis with Environment-sensitive Malware.
Bianchi et al. Exploitation and mitigation of authentication schemes based on device-public information
Breitenbacher et al. HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version)
Pitney et al. A systematic review of 2021 microsoft exchange data breach exploiting multiple vulnerabilities
Alzahrani et al. Ransomware in windows and android platforms
Genç et al. NoCry: No more secure encryption keys for cryptographic ransomware
Eliando et al. LockBit 2.0 Ransomware: Analysis of infection, persistence, prevention mechanism
Bedi et al. Analysis of detection and prevention of malware in cloud computing environment
Birnbaum et al. Cloud security auditing based on behavioral modeling