Attacking key management in ransomware

P Bajpai, R Enbody - IT Professional, 2020 - ieeexplore.ieee.org
Ransomware have observed a steady growth over the years with several concerning trends
that indicate efficient, targeted attacks against organizations and individuals alike. These …

Analysis of encryption key generation in modern crypto ransomware

F Cicala, E Bertino - IEEE Transactions on Dependable and …, 2020 - ieeexplore.ieee.org
The scale of ransomware attacks increases every year, and so does its cost, which has
reached billions of dollars. A specific class of ransomware, called crypto ransomware …

Security analysis of key acquiring strategies used by cryptographic ransomware

ZA Genç, G Lenzini, PYA Ryan - Proceedings of the Central European …, 2018 - dl.acm.org
To achieve its goals, ransomware needs to employ strong encryption, which in turn requires
access to high-grade encryption keys. Over the evolution of ransomware, various techniques …

On the effectiveness of ransomware decryption tools

B Filiz, B Arief, O Cetin, J Hernandez-Castro - Computers & Security, 2021 - Elsevier
Ransomware is a type of malware that locks out its victim's access to their devices or data–
typically by encrypting files–and demands payment in exchange of restoring access. To fight …

A key-management-based taxonomy for ransomware

P Bajpai, AK Sood, R Enbody - 2018 APWG Symposium on …, 2018 - ieeexplore.ieee.org
Ransomware encrypts user files making management of the encryption key (s) critical to its
success. Developing a better understanding of key management in ransomware is a …

Dissecting. net ransomware: key generation, encryption and operation

P Bajpai, R Enbody - Network Security, 2020 - Elsevier
The threat of ransomware is ever growing. Not all ransomware types are created equal and
the cryptosystems in some forms are more virulent than others. This article dissects eight …

[HTML][HTML] Cryptographic ransomware encryption detection: Survey

K Begovic, A Al-Ali, Q Malluhi - Computers & Security, 2023 - Elsevier
The ransomware threat has loomed over our digital life since 1989. Criminals use this type
of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts …

RansomClave: ransomware key management using SGX

A Bhudia, D O'Keeffe, D Sgandurra… - Proceedings of the 16th …, 2021 - dl.acm.org
Modern ransomware often generate and manage cryptographic keys on the victim's
machine, giving defenders an opportunity to capture exposed keys and recover encrypted …

The cipher, the random and the ransom: a survey on current and future ransomware

ZA Genç, G Lenzini, P Ryan - Central European Cybersecurity …, 2017 - orbilu.uni.lu
Although conceptually not new, ransomware recently regained attraction in the cybersecurity
community: notorious attacks in fact have caused serious damage, proving their disruptive …

Ransomware and the legacy crypto API

A Palisse, H Le Bouder, JL Lanet, C Le Guernic… - Risks and Security of …, 2017 - Springer
Ransomware are malicious software that encrypt their victim's data and only return the
decryption key in exchange of a ransom. After presenting their characteristics and main …