Title | Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Genç, Ziya Alper, Lenzini, Gabriele, Ryan, Peter Y.A. |
Conference Name | Proceedings of the Central European Cybersecurity Conference 2018 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-6515-4 |
Keywords | composability, key acquiring, Malware, Metrics, pubcrawl, ransomware, Resiliency, security analysis |
Abstract | To achieve its goals, ransomware needs to employ strong encryption, which in turn requires access to high-grade encryption keys. Over the evolution of ransomware, various techniques have been observed to accomplish the latter. Understanding the advantages and disadvantages of each method is essential to develop robust defense strategies. In this paper we explain the techniques used by ransomware to derive encryption keys and analyze the security of each approach. We argue that recovery of data might be possible if the ransomware cannot access high entropy randomness sources. As an evidence to support our theoretical results, we provide a decryptor program for a previously undefeated ransomware. |
URL | http://doi.acm.org/10.1145/3277570.3277577 |
DOI | 10.1145/3277570.3277577 |
Citation Key | genc_security_2018 |