Abstract
Recent attacks exploiting a known vulnerability continue a downward spiral of ransomware-related incidents.
- Barth, B. California ransomware bill supported by Hollywood hospital passes committee. SC Magazine (Apr. 13, 2016).Google Scholar
- Christensen, C. The Innovator's Solution: Creating and Sustaining Successful Growth. Harvard Business School Press, 2003.Google Scholar
- Eisler, B. Fault Line. Ballantine Books, 2009.Google Scholar
- Santayana, G. Reason in Common Sense, (1905), p. 284, volume 1 of The Life of Reason.Google Scholar
- Scott, R. Alien. 20th Century Fox, 1979.Google Scholar
- U.S. Dept. of Health and Human Services. FACT SHEET: Ransomware and HIPAA; http://bit.ly/29zm57BGoogle Scholar
- Volz, D. and Auchard, E. More disruptions feared from cyber attack; Microsoft slams government secrecy. Reuters (May 15, 2017).Google Scholar
- Young, A. and Yung, M. Cryptovirology: Extortion-based security threats and countermeasures. In Proceedings of the IEEE Symposium on Security and Privacy, (1996), 129--140. Google ScholarDigital Library
- Young, A. and Yung, M. Malicious cryptography--Exposing cryptovirology. Wiley, 2004. Google ScholarDigital Library
Index Terms
- Cryptovirology: the birth, neglect, and explosion of ransomware
Recommendations
Cryptovirology: extortion-based security threats and countermeasures
SP'96: Proceedings of the 1996 IEEE conference on Security and privacyTraditionally, cryptography and its applications are defensive in nature, and provide privacy, authentication, and security to users. In this paper we present the idea of Cryptovirology which employs a twist on cryptography, showing that it can also be ...
Cryptovirology: Extortion-Based Security Threats and Countermeasures
SP '96: Proceedings of the 1996 IEEE Symposium on Security and PrivacyTraditionally, cryptography and its applications are defensive in nature, and provide privacy, authentication, and security to users. In this paper we present the idea of ``Cryptovirology'' which employs a twist on cryptography, showing that it can also ...
Surviving Distributed Denial-of-Service Attacks
A series of distributed denial-of-service (DDoS) attacks were launched against computer systems and services in the US and South Korea beginning July 4th. A DDoS attack is an attempt to make a computer service unavailable to its intended users. The ...
Comments