2016
DOI: 10.1109/mic.2016.90
|View full text |Cite
|
Sign up to set email alerts
|

Evil Offspring - Ransomware and Crypto Technology

Abstract: T he IEEE Computer Society's lineup of 13 peer-reviewed technical magazines covers cutting-edge topics ranging from software design and computer graphics to Internet computing and security, from scientifi c applications and machine intelligence to cloud migration and microchip manufacturing. Here are highlights from recent issues. Computer Human-augmentation technologies can help users enhance existing abilities and give them some they lack. These technologies are the focus of Computer's February 2017 special … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 7 publications
0
10
0
1
Order By: Relevance
“…Sometime backup might be the only option to restore services in some cases such as ransomware attacks. Organisation with a tested offline backup are less likely to end up with encrypted backup given malware developer are known to target online back to force victims to meet their demands [79].…”
Section: G Resilience Metricmentioning
confidence: 99%
“…Sometime backup might be the only option to restore services in some cases such as ransomware attacks. Organisation with a tested offline backup are less likely to end up with encrypted backup given malware developer are known to target online back to force victims to meet their demands [79].…”
Section: G Resilience Metricmentioning
confidence: 99%
“…Some attackers deploy ransomware V3, such as IEncrypt, with an embedded VK pub to eliminate outbound connections. However, using one global VK prv could lead to victims collaborating and sharing the master key [45].…”
Section: Ransomware Key Management Requirementsmentioning
confidence: 99%
“…La historia del ransomware data de finales de los años 80 e inicios de los 90 con el primer ransomware denominado AIDS trojan, distribuido en un floppy disk, durante una conferencia internacional sobre SIDA, el cual cifraba el nombre de los archivos solamente, solicitando un pago a una cuenta bancaria localizada en Panamá [6].…”
Section: El Ransomware En Sus Iniciosunclassified