Proceedings 1996 IEEE Symposium on Security and Privacy
DOI: 10.1109/secpri.1996.502676
|View full text |Cite
|
Sign up to set email alerts
|

Cryptovirology: extortion-based security threats and countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
93
0
3

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 160 publications
(97 citation statements)
references
References 12 publications
1
93
0
3
Order By: Relevance
“…Young and Yung where the first to raise the concern about malicious use of cryptography (cryptovirology) [13] and have several works related to malware construction and propagation: A virus capable of encrypting files on the victim's computer and hold them for ransom [12]. A mobile program that carries a rerandomizable ciphertext, which enables anonymous communication, where the program takes random walks through a network in a system called Feralcore, and, at each node, the ciphertext is rerandomized [14].…”
Section: Related Workmentioning
confidence: 99%
“…Young and Yung where the first to raise the concern about malicious use of cryptography (cryptovirology) [13] and have several works related to malware construction and propagation: A virus capable of encrypting files on the victim's computer and hold them for ransom [12]. A mobile program that carries a rerandomizable ciphertext, which enables anonymous communication, where the program takes random walks through a network in a system called Feralcore, and, at each node, the ciphertext is rerandomized [14].…”
Section: Related Workmentioning
confidence: 99%
“…However, if just two sites are compromised, an attacker can corrupt or otherwise modify those shares such that it is impossible for anyone to obtain the required number of valid shares, thereby successfully executing a denial of service attack and ultimately data loss. An overly high threshold also increases the risk of a ransomware attack [9]: the attacker encrypts the data, and then ransoms it back for a price.…”
Section: Splitting Scheme Flexibilitymentioning
confidence: 99%
“…Young and Yung (1996) discuss cryptoviruses, which use strong cryptography in a virus' payload for extortion purposes. Riordan and Schneier (1998) Filiol's work is most related to ours: it uses environmental key generation to decrypt viral code which is strongly-encrypted.…”
Section: Related Work and Conclusionmentioning
confidence: 99%