Costandache et al., 2020 - Google Patents
New directions in the ransomware phenomenonCostandache et al., 2020
View PDF- Document ID
- 6077098863034785369
- Author
- Costandache M
- Mihalache M
- Simion E
- Publication year
- Publication venue
- Cryptology ePrint Archive
External Links
Snippet
Ransomware is a type of malware that blocks an user's access to files and requests him/her a ransom. The main approach of an attacker is to encrypt the user's files and give him/her the decrypting tool only after he/she pays the requested amount of money. The payment is …
- 230000002265 prevention 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dargahi et al. | A Cyber-Kill-Chain based taxonomy of crypto-ransomware features | |
Mos et al. | The growing influence of ransomware | |
Virvilis et al. | Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game? | |
Upadhyaya et al. | Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet | |
Adamov et al. | The state of ransomware. Trends and mitigation techniques | |
Riccardi et al. | Titans’ revenge: Detecting Zeus via its own flaws | |
Kalaimannan et al. | Influences on ransomware’s evolution and predictions for the future challenges | |
Hassan | Ransomware Families: The Most Prominent Ransomware Strains | |
Shah et al. | Ransomware-Threats, vulnerabilities and recommendations | |
Zimba et al. | Recent advances in cryptovirology: State-of-the-art crypto mining and crypto ransomware attacks | |
Singh et al. | REvil Ransomware | |
Thakur et al. | Ransomware: Threats, identification and prevention | |
DS et al. | A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants | |
Barde | Blockchain-based cyber security | |
Mehra et al. | Elucidating ransomware attacks in cyber-security | |
Costandache et al. | New directions in the ransomware phenomenon | |
Hassan | Ransomware overview | |
Narain | Ransomware-rising menace to an unsuspecting cyber audience | |
Indu et al. | Ransomware: A New Era of Digital Terrorism | |
Schell et al. | HOW US AND CANADIAN UNIVERSITIES AND COLLEGES DEALT WITH MALWARE AND RANSOMWARE ATTACKS IN 2016-2017. | |
Alexander | Examining the Efficacy of Defensive Strategies Designed to Prevent Ransomware in K-12 School Districts: A Case Study | |
McElhinney et al. | The Rise of Ransomware Aided by Vulnerable IoT Devices | |
Narula et al. | Breaking Ransomware: Explore ways to find and exploit flaws in a ransomware attack (English Edition) | |
Muttoo et al. | Analysing security checkpoints for an integrated utility-based information system | |
Branche | Ransomware: An Analysis of the Current and Future Threat Ransomware Presents |