Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
opinion
Free access

Cryptovirology: the birth, neglect, and explosion of ransomware

Published: 26 June 2017 Publication History
  • Get Citation Alerts
  • Abstract

    Recent attacks exploiting a known vulnerability continue a downward spiral of ransomware-related incidents.

    References

    [1]
    Barth, B. California ransomware bill supported by Hollywood hospital passes committee. SC Magazine (Apr. 13, 2016).
    [2]
    Christensen, C. The Innovator's Solution: Creating and Sustaining Successful Growth. Harvard Business School Press, 2003.
    [3]
    Eisler, B. Fault Line. Ballantine Books, 2009.
    [4]
    Santayana, G. Reason in Common Sense, (1905), p. 284, volume 1 of The Life of Reason.
    [5]
    Scott, R. Alien. 20th Century Fox, 1979.
    [6]
    U.S. Dept. of Health and Human Services. FACT SHEET: Ransomware and HIPAA; http://bit.ly/29zm57B
    [7]
    Volz, D. and Auchard, E. More disruptions feared from cyber attack; Microsoft slams government secrecy. Reuters (May 15, 2017).
    [8]
    Young, A. and Yung, M. Cryptovirology: Extortion-based security threats and countermeasures. In Proceedings of the IEEE Symposium on Security and Privacy, (1996), 129--140.
    [9]
    Young, A. and Yung, M. Malicious cryptography--Exposing cryptovirology. Wiley, 2004.

    Cited By

    View all
    • (2023)The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?International Cybersecurity Law Review10.1365/s43439-023-00095-w4:3(259-280)Online publication date: 13-Jul-2023
    • (2023)How Crime Shapes Insurance and Insurance Shapes CrimeJournal of Legal Analysis10.1093/jla/laad00215:1(183-200)Online publication date: 6-Sep-2023
    • (2023)SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid featuresExpert Systems with Applications10.1016/j.eswa.2023.120017225(120017)Online publication date: Oct-2023
    • Show More Cited By

    Index Terms

    1. Cryptovirology: the birth, neglect, and explosion of ransomware

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Communications of the ACM
      Communications of the ACM  Volume 60, Issue 7
      July 2017
      89 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3116227
      Issue’s Table of Contents
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 26 June 2017
      Published in CACM Volume 60, Issue 7

      Check for updates

      Qualifiers

      • Opinion
      • Popular
      • Un-reviewed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)283
      • Downloads (Last 6 weeks)38
      Reflects downloads up to 26 Jul 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?International Cybersecurity Law Review10.1365/s43439-023-00095-w4:3(259-280)Online publication date: 13-Jul-2023
      • (2023)How Crime Shapes Insurance and Insurance Shapes CrimeJournal of Legal Analysis10.1093/jla/laad00215:1(183-200)Online publication date: 6-Sep-2023
      • (2023)SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid featuresExpert Systems with Applications10.1016/j.eswa.2023.120017225(120017)Online publication date: Oct-2023
      • (2023)Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAPDiscover Internet of Things10.1007/s43926-023-00053-23:1Online publication date: 30-Nov-2023
      • (2022)Ransomware-Resilient Self-Healing XML DocumentsFuture Internet10.3390/fi1404011514:4(115)Online publication date: 7-Apr-2022
      • (2022)Public Key Cryptography’s Impact on Society: How Diffie and Hellman Changed the WorldDemocratizing Cryptography10.1145/3549993.3549997(19-56)Online publication date: 24-Aug-2022
      • (2022)Insurance and enterprise: cyber insurance for ransomwareThe Geneva Papers on Risk and Insurance - Issues and Practice10.1057/s41288-022-00281-748:2(275-299)Online publication date: 4-Dec-2022
      • (2022)Behavior-based ransomware classificationApplied Soft Computing10.1016/j.asoc.2022.108744121:COnline publication date: 1-May-2022
      • (2022)A review on spreading and Forensics Analysis of Windows-Based ransomwareAnnals of Data Science10.1007/s40745-022-00417-5Online publication date: 8-Jun-2022
      • (2022)Challenges on Digital Cyber-Security and Network Forensics: A SurveyAdvances on Intelligent Informatics and Computing10.1007/978-3-030-98741-1_43(524-537)Online publication date: 30-Mar-2022
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Digital Edition

      View this article in digital edition.

      Digital Edition

      Magazine Site

      View this article on the magazine site (external)

      Magazine Site

      Get Access

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media