2022
DOI: 10.1109/access.2022.3168991
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study

Abstract: The integrated circuit (IC) ecosystem, today, is widely distributed. Usually, a handful of companies is involved in the development of a single chip -an environment that presents many opportunities for malicious activities such as the insertion of hardware trojan horses. This work presents a specialized form of a hardware trojan that is able to mount a hardware-based ransomware attack, an attack that previously only existed in the software domain. This attack is therefore termed a hardware ransomware and is th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…Later campaigns like WannaCry (2017) and DarkSide (2020) took advantage of unpatched software vulnerabilities to propagate quickly across networks in worm-like fashion [34,35,21]. These marked a shift towards "big game hunting", targeting victims with deeper pockets through manual, lateral movement techniques post-intrusion [24,36]. Attackers eventually realized that data encryption alone was an inadequate extortion tactic.…”
Section: Ransomware Evolutionmentioning
confidence: 99%
See 1 more Smart Citation
“…Later campaigns like WannaCry (2017) and DarkSide (2020) took advantage of unpatched software vulnerabilities to propagate quickly across networks in worm-like fashion [34,35,21]. These marked a shift towards "big game hunting", targeting victims with deeper pockets through manual, lateral movement techniques post-intrusion [24,36]. Attackers eventually realized that data encryption alone was an inadequate extortion tactic.…”
Section: Ransomware Evolutionmentioning
confidence: 99%
“…However, advanced evasion techniques like polymorphism, metamorphism, and antisandbox checks allow threats to avoid triggering alerts [30,46]. Attackers now operate slowly and stealthily, conducting extensive internal reconnaissance over months before staging data and launching encryption [36,13]. Hence, existing defenses have largely only managed to capture threats post-breach as opposed to preventing breaches entirely [31,33].…”
Section: Ransomware Detectionmentioning
confidence: 99%
“…Extensive studies have been conducted on various features of ransomware. One key aspect analyzed is the use of sophisticated fingerprinting methods by ransomware, which include time, date, language, and geolocation data, to tailor social engineering attacks [11,12]. For example, ransomware variants like Reveton and Cerber have been noted for customizing ransom notes in the victim's language, enhancing the efficacy of the scam [13,14,15,16].…”
Section: Ransomware Feature Studiesmentioning
confidence: 99%
“…Financial gain is one of the primary motivations behind ransomware attacks on transportation systems. Transportation systems are interesting targets because they frequently manage significant quantities of sensitive data and play a vital part in people's everyday lives [43]. Ransomware is used by attackers to encrypt crucial data and demand money in exchange for the decryption key; it may be a profitable source of cash for hackers.…”
Section: Motivating Factors Of Ransomware Attacks On Transportation S...mentioning
confidence: 99%