2017 IEEE Conference on Application, Information and Network Security (AINS) 2017
DOI: 10.1109/ains.2017.8270426
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic ransomware protection using deterministic random bit generator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…We intend to show that also for this option be 10 https://referencesource.microsoft.com/#mscorlib/system/random.cs. 11 Available at https://github.com/zisk/evil-decrypter. secure, ransomware needs to call CSPRNG APIs of the host system, a strategy that UShallNotPass anti-ransomware can nullify.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…We intend to show that also for this option be 10 https://referencesource.microsoft.com/#mscorlib/system/random.cs. 11 Available at https://github.com/zisk/evil-decrypter. secure, ransomware needs to call CSPRNG APIs of the host system, a strategy that UShallNotPass anti-ransomware can nullify.…”
Section: Discussionmentioning
confidence: 99%
“…Replacing CSPRNG functions with a backdoored PRNG, enables defences to reproduce the outputs obtained by applications that called these functions. Kim et al proposed such a strategy [11]. They replace the CSPRNG of the host system with a user-defined number generator.…”
Section: Key-oriented Protection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the case of a ransomware attack, the encrypted files are tried by brute-forcing to be decrypted by retrieving the keys and other necessary parameters from the key vault. A slightly different method, Deterministic Random Bits Generator (DRBG) is proposed by Kim et al [12] to retrieve the random numbers that ransomware used after an attack. DRBG replaces the CSPRNG of the system with a back-doored PRNG.…”
Section: State Of the Art In Ransomware Defensementioning
confidence: 99%
“…Using these seed values, the keys used by ransomware are re-derived and the files are restored. In [16], Kim et al proposed this technique to mitigate ransomware. (KP-iii)escrowing encryption keys.…”
Section: Defense Techniques: the State Of The Artmentioning
confidence: 99%