Ransomware and the Legacy Crypto API - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2017

Ransomware and the Legacy Crypto API

Résumé

Ransomware are malicious software that encrypt their victim’s data and only return the decryption key in exchange of a ransom. After presenting their characteristics and main representatives, we introduce two original countermeasures allowing victims to decrypt their files without paying. The first one takes advantage of the weak mode of operation used by some ransomware. The second one intercept calls made to Microsoft’s Cryptographic API. Both methods must be active before the attack takes place, and none is general enough to handle all ransomware. Nevertheless our experimental results show that their combination can protect users from 50% of the active samples at our disposal.
Fichier principal
Vignette du fichier
papier.pdf (432.73 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01388056 , version 1 (28-03-2017)

Identifiants

Citer

Aurélien Palisse, Hélène Le Bouder, Jean-Louis Lanet, Colas Le Guernic, Axel Legay. Ransomware and the Legacy Crypto API. The 11th International Conference on Risks and Security of Internet and Systems - CRiSIS 2016, Sep 2016, Roscoff, France. pp.11-28, ⟨10.1007/978-3-319-54876-0_2⟩. ⟨hal-01388056⟩
566 Consultations
2207 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More