Crypto-ransomware: A revision of the state of the art, advances and challenges

JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …

Next generation cryptographic ransomware

ZA Genç, G Lenzini, PYA Ryan - … 2018, Oslo, Norway, November 28-30 …, 2018 - Springer
We are assisting at an evolution in the ecosystem of cryptoware—the malware that encrypts
files and makes them unavailable unless the victim pays up. New variants are taking the …

The growing influence of ransomware

MA Mos, MM Chowdhury - 2020 IEEE International Conference …, 2020 - ieeexplore.ieee.org
Ransomware is a malicious cyber-attack in which a user's files are encrypted and rendered
inaccessible until the attacker receives a ransomed amount in return for the decryption key …

[PDF][PDF] Ransomware: Current trend, challenges, and research directions

SI Popoola, UB Iyekekpolo, SO Ojewande… - Proceedings of the …, 2017 - iaeng.org
Ransomware attacks have become a global incidence, with the primary aim of making
monetary gains through illicit means. The attack started through e-mails and has expanded …

A survey on detection techniques for cryptographic ransomware

E Berrueta, D Morato, E Magaña, M Izal - IEEE Access, 2019 - ieeexplore.ieee.org
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data,
and asks for a ransom to recover the hijacked documents. It is a cyber threat that targets both …

A comprehensive survey on ransomware attack: A growing havoc cyberthreat

A Tandon, A Nayyar - … , Analytics and Innovation: Proceedings of ICDMAI …, 2019 - Springer
Never in the history of humanity, people all over the world are subject to exaction on a huge
scale as they are today. In the recent years, the usage of PCs and the Internet has exploded …

Evil offspring-ransomware and crypto technology

H Orman - IEEE Internet Computing, 2016 - ieeexplore.ieee.org
Crypto ransomware is increasingly clever. For anyone contending with it, it helps to know the
options available to the malware writers and how they might be tripped up or deflected. It is …

Ransomware: A new cyber hijacking threat to enterprises

X Luo, Q Liao - Handbook of research on information security and …, 2009 - igi-global.com
In computer virology, advanced encryption algorithms, on the bright side, can be utilized to
effectively protect valuable information assets of enterprises. Yet, on the dark side, they can …

Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions

BAS Al-Rimy, MA Maarof, SZM Shaid - Computers & Security, 2018 - Elsevier
Ransomware is a malware category that exploits security mechanisms such as cryptography
in order to hijack user files and related resources and demands money in exchange for the …

Cryptovirology: The birth, neglect, and explosion of ransomware

AL Young, M Yung - Communications of the ACM, 2017 - dl.acm.org
Cryptovirology: the birth, neglect, and explosion of ransomware Page 1 24 COMMUNICATIONS
OF THE ACM | JULY 2017 | VOL. 60 | NO. 7 viewpoints topus. It would wrap its legs around the …