27.06.2013 Views

Crypto Virology Seminar.PPT - 123SeminarsOnly

Crypto Virology Seminar.PPT - 123SeminarsOnly

Crypto Virology Seminar.PPT - 123SeminarsOnly

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Countermeasures<br />

BBackups k<br />

Anti‐virus software : Implement mechanisms<br />

to detect viruses immediately after<br />

infiltration.<br />

Access control to cryptographic tools<br />

If strong crypto ciphers and random number<br />

generators are available to user processes, then<br />

they are available to viruses.<br />

On‐line proactive anti‐viral measures –<br />

theoretic for now now.<br />

References<br />

<strong>Crypto</strong>virology: Extortion‐Based Security Threats and<br />

Countermeasures<br />

Cryptanalysis of the Gpcode.ak ransomware virus, Eran Tromer ,<br />

MIT<br />

An Analysis of Conficker's Logic and Rendezvous Points: Phillip<br />

Porras, Hassen Saidi, and Vinod Yegneswaran<br />

http://mtc.sri.com/Conficker<br />

CConficker fi k C Analysis: A l i Philli Phillip PPorras, HHassen Sidi Saidi, and d Vi Vinod d<br />

Yegneswaran<br />

http://www.viruslist.com/en/viruses/encyclopedia?virusid=313<br />

444<br />

http://en.wikipedia.org/wiki/Gpcode<br />

How to Withstand mobile virus attacks by Ostrovsky and Yung.<br />

37<br />

39<br />

Conclusion<br />

C<strong>Crypto</strong>graphic hi tools l can bbe used d to create a<br />

new class of viruses: <strong>Crypto</strong>viruses<br />

Author h need d not bbe aware of f underlying d l<br />

cryptography –use available functions<br />

Gives the virus writer an extortion method<br />

Better to make attacks publicly known than to<br />

wait for attacks to occur<br />

38

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!