Cryptovirology: Virus Approach

@article{Shivale2011CryptovirologyVA,
  title={Cryptovirology: Virus Approach},
  author={Saurabh Anandrao Shivale},
  journal={ArXiv},
  year={2011},
  volume={abs/1108.2482}
}
Traditionally, "Cryptography" is a benediction to information processing and communications, it helps people to store information securely and the private communications over long distances. Cryptovirology is the study of applications of cryptography to build the malicious software. It is an investigation, how modern cryptographic tools and paradigms can be used to strengthen, develop and improve new malicious software attacks. Cryptovirology attacks have been categorized as : give malware… Expand
7 Citations
Cryptoviral Extortion: Evolution, Scenarios, and Analysis
TLDR
Better understanding is given of the concept of “Cryptovirology” which presents how cryptography can also be misused in the world of cyber crime. Expand
Overinfection in Ransomware
TLDR
It is shown that the overinfection in ransomware can have four levels: Level 0 to ensure that the ransomware is not executed twice at the same time on the same machine, Level 1 to avoid re-encrypting its encrypted files, Level 2 to coordinate between its infections on thesame machine and Level 3 to manage the infection between many target machines in the same computer park. Expand
КРИПТОВІРОЛОГІЯ: ЗАГРОЗИ БЕЗПЕКИ ГАРАНТОЗДАТНИМ ІНФОРМАЦІЙНИМ СИСТЕМАМ І ЗАХОДИ ПРОТИДІЇ ШИФРУВАЛЬНИМ ВІРУСАМ
TLDR
The paper proposes a description of the computational complexity of encrypted data recovery problems, including methods for parallelizing the solution of cryptanalysis problems, methods used to solve problems of cryptosystem stability assessment, vulnerability search and decryption depending on basic mathematical methods. Expand
Mail-Server Unleashed
Hodiernal Cryptovirology is rooted on cryptographic based algorithms and mathematical functions. Ccryptographic algorithms are contemplated around computational hardness assumptions, making suchExpand
Connection-monitor & connection-breaker: A novel approach for prevention and detection of high survivable ransomwares
TLDR
This paper presents a novel approach for detecting high survivable ransomwares and preventing them from encrypting victim's data and demonstrates that this framework can detect variants of recent dangerous ransomware. Expand
Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes
TLDR
A static analysis framework based on N-gram opcodes with deep learning and the first to exploit self-attention mechanism on opcode sequences for ransomware classification, which outperforms the state-of-the-art methods in many evaluations. Expand
Unsupervised Learning Trojan
ii List of Tables v List of Figures x

References

SHOWING 1-10 OF 18 REFERENCES
Cryptovirology: extortion-based security threats and countermeasures
TLDR
The idea of Cryptovirology is presented, which employs a twist on cryptography, showing that it can be used offensively to mount extortion based attacks that cause loss of access to information, loss of confidentiality, and information leakage, tasks which cryptography typically prevents. Expand
An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API
This chapter presents an experimental implementation of cryptoviral extortion, an attack that we devised and presented at the 1996 IEEE Symposium on Security & Privacy [16] and that was recentlyExpand
Deniable password snatching: on the possibility of evasive electronic espionage
  • Adam L. Young, M. Yung
  • Computer Science
  • Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
  • 1997
TLDR
This work presents an attack that can be mounted by a cryptotrojan that allows the attacker to gather information from a system in such a way that the attacker cannot be proven guilty beyond reasonable doubt. Expand
I. Mitigating Insider Threats to RSA Key Generation
RSA keys form the cornerstone for numerous security systems. They provide for confidentiality of communications as well as non-repudiability of digital signatures. However, there are several insiderExpand
Chapter 10: An Elliptic Curve Asymmetric Backdoor in OpenSSL RSA Key Generation
TLDR
This chapter and the corresponding appendix constitutes Fundamental Research in cryptovirology and expands on the elliptic curve backdoor in RSA key generation that was presented at the Selected Areas in Cryptography conference in 2005 and employs several algorithmic improvements that enable the key generator to run faster. Expand
How To Withstand Mobile Virus Attacks
We initiate a study of distributed adversarial model of computation in which faults are non-stationary and can move through the network, analogous to a spread of a virus or a worm. We show how localExpand
Cryptovirilogy: Extortion-Based Security Threat And Countermeasures
  • Proceedings of the 1996 IEEE Symposium on Security and Privacy
Malicious Website / Malicious Code: Cyber Extortion Attack
  • Malicious Website / Malicious Code: Cyber Extortion Attack
  • 2005
Math 187: Introduction to Cryptography Spring 2005 ‘Cryptography and Viruses
  • 2005
David Chess Virus bulletin conferenceCan cryptography prevent computer viruses
  • David Chess Virus bulletin conferenceCan cryptography prevent computer viruses
  • 2000
...
1
2
...