2004
DOI: 10.1016/s0267-3649(04)00079-2
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography: Malicious Cryptography – Exposing Cryptovirology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
70
0
7

Year Published

2006
2006
2019
2019

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(77 citation statements)
references
References 0 publications
0
70
0
7
Order By: Relevance
“…Ransomware: In 2004, Young and Yung first suggested the idea of a virus that encrypts data on victims' computers using an asymmetric cipher and holds it hostage for ransom [22]. The decryption key is not embedded in the virus codebase, so the attack cannot be reverse-engineered.…”
Section: Theft and Malwarementioning
confidence: 99%
“…Ransomware: In 2004, Young and Yung first suggested the idea of a virus that encrypts data on victims' computers using an asymmetric cipher and holds it hostage for ransom [22]. The decryption key is not embedded in the virus codebase, so the attack cannot be reverse-engineered.…”
Section: Theft and Malwarementioning
confidence: 99%
“…We envision many applications of the approach proposed in this paper, including: -Malware analysis: A Trojan that employs cryptovirology [6] and exploits covert channels in commodity operating systems could be placed in a virtual machine and the mutual information between various inputs (e.g., credit card numbers, passwords, personal files) and potential outputs (e.g., the network, the hard drive) could be measured as an analysis of the Trojan's capabilities and purpose. -Testing to guide system design: The basic framework for information flow measurement via repeated deterministic replays presented in this paper could be used to test existing systems for inference and side channels [7][8][9][10].…”
Section: Applicationsmentioning
confidence: 99%
“…In this example two bits are simply masked out and written directly to the hard drive 6 . Figure 2(b) shows that after 38 replays of the transaction only four states have been observed, so that with 99.8% confidence (see Section 4.3) we can reject the null hypothesis and ensure that the policy ǫ = 2 was enforced.…”
Section: Prototype Implementation and Examplementioning
confidence: 99%
“…Our goal, of course, is not to empower criminal operations, but to evaluate this threat so that preemptive solutions may be devised. This is in the spirit of existing research efforts exploring emergent threats (such as cryptovirology [7] and the FORWARD initiative [8]). Our specific contributions are:…”
Section: Introductionmentioning
confidence: 99%