2018 International Conference on Communication and Signal Processing (ICCSP) 2018
DOI: 10.1109/iccsp.2018.8524494
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of AES-CBC Encryption for Interpreting Crypto-Wall Ransomware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Updating the cipher key consists of three main steps; shift operation, XOR, and changing the key's time. Research by Pillai et al [23] provided a time analysis of the ransomware that uses the AES-CBC encryption algorithm. Their results show that the encryption time depends on two main factors; the key size and the size of the data to be encrypted.…”
Section: Related Workmentioning
confidence: 99%
“…Updating the cipher key consists of three main steps; shift operation, XOR, and changing the key's time. Research by Pillai et al [23] provided a time analysis of the ransomware that uses the AES-CBC encryption algorithm. Their results show that the encryption time depends on two main factors; the key size and the size of the data to be encrypted.…”
Section: Related Workmentioning
confidence: 99%
“…If suspicious behavior is detected, the SDN controller blocks the IP or domain. Furthermore, the SDN concept is also applied in [50]. This work tracks the behavior of crypto locker ransomware using asymmetric encryption.…”
Section: Detection and Predictionmentioning
confidence: 99%
“…Here are four stages of viruses in the episode: The first step is phishing campaigns through email and website links, then manipulating users to execute malicious files and gain access rights on the user's computer. The second stage is accessing computer resources, deleting backup data, encrypting data with curve25519 or AES-256-CTR encryption [7][8][9]. The third stage displays a ransom message to the user's monitor screen.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the fourth stage spreads advanced infections to his other computers. Based on this, the importance of mitigating because the excess of this virus can apply widespread attack expansion through the same network traffic and can operate without having to connect to the command and control server [9][10][11].…”
Section: Introductionmentioning
confidence: 99%