Visible to the public Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware

TitleSecurity Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware
Publication TypeConference Paper
Year of Publication2018
AuthorsGenç, Ziya Alper, Lenzini, Gabriele, Ryan, Peter Y.A.
Conference NameProceedings of the Central European Cybersecurity Conference 2018
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6515-4
Keywordscomposability, key acquiring, Malware, Metrics, pubcrawl, ransomware, Resiliency, security analysis
AbstractTo achieve its goals, ransomware needs to employ strong encryption, which in turn requires access to high-grade encryption keys. Over the evolution of ransomware, various techniques have been observed to accomplish the latter. Understanding the advantages and disadvantages of each method is essential to develop robust defense strategies. In this paper we explain the techniques used by ransomware to derive encryption keys and analyze the security of each approach. We argue that recovery of data might be possible if the ransomware cannot access high entropy randomness sources. As an evidence to support our theoretical results, we provide a decryptor program for a previously undefeated ransomware.
URLhttp://doi.acm.org/10.1145/3277570.3277577
DOI10.1145/3277570.3277577
Citation Keygenc_security_2018