Genç et al., 2018 - Google Patents
No random, no ransom: a key to stop cryptographic ransomwareGenç et al., 2018
View PDF- Document ID
- 12947848556865462667
- Author
- Genç Z
- Lenzini G
- Ryan P
- Publication year
- Publication venue
- Detection of Intrusions and Malware, and Vulnerability Assessment: 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings 15
External Links
Snippet
To be effective, ransomware has to implement strong encryption, and strong encryption in turn requires a good source of random numbers. Without access to true randomness, ransomware relies on the pseudo random number generators that modern Operating …
- 239000008186 active pharmaceutical agent 0 abstract description 15
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Genç et al. | No random, no ransom: a key to stop cryptographic ransomware | |
Bhat et al. | A survey on various threats and current state of security in android platform | |
Modi et al. | A survey on security issues and solutions at different layers of Cloud computing | |
Kolodenker et al. | Paybreak: Defense against cryptographic ransomware | |
Zavarsky et al. | Experimental analysis of ransomware on windows and android platforms: Evolution and characterization | |
Khan | A survey of security issues for cloud computing | |
Islam et al. | A classification and characterization of security threats in cloud computing | |
Lu et al. | Blade: an attack-agnostic approach for preventing drive-by malware infections | |
US7743260B2 (en) | Firewall+storage apparatus, method and system | |
US8474032B2 (en) | Firewall+ storage apparatus, method and system | |
Irazoqui et al. | Know thy neighbor: Crypto library detection in cloud | |
Sood et al. | An empirical study of HTTP-based financial botnets | |
Xu et al. | Data-provenance verification for secure hosts | |
Lee et al. | Ransomware prevention technique using key backup | |
Huber et al. | The lazarus effect: Healing compromised devices in the internet of small things | |
Ibarra et al. | Ransomware impact to SCADA systems and its scope to critical infrastructure | |
Song et al. | Impeding Automated Malware Analysis with Environment-sensitive Malware. | |
Bianchi et al. | Exploitation and mitigation of authentication schemes based on device-public information | |
Breitenbacher et al. | HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version) | |
Pitney et al. | A systematic review of 2021 microsoft exchange data breach exploiting multiple vulnerabilities | |
Alzahrani et al. | Ransomware in windows and android platforms | |
Genç et al. | NoCry: No more secure encryption keys for cryptographic ransomware | |
Eliando et al. | LockBit 2.0 Ransomware: Analysis of infection, persistence, prevention mechanism | |
Bedi et al. | Analysis of detection and prevention of malware in cloud computing environment | |
Birnbaum et al. | Cloud security auditing based on behavioral modeling |