과제정보
This paper was supported by RESEARCH FUND offered from Catholic University of Pusan.
참고문헌
- Kaspersky. Kaspersky Security Bulletin 2016. The ransomware revolution. [Internet] Available: https://securelist.com/kasperskysecurity-bulletin-2016-story-of-the-year/76757/.
- M. Kassner, TechRepublic, "Ransomware: Extortion via the Internet [Internet]. Available: https://www.techrepublic.com/article/ransomwareextortion-via-the-internet/.
- J. Leyden, TheRegister, Ransomware getting harder to break [Internet]. Available: https://www.theregister.com/2006/07/24/ransomware/.
- Ryan, Dancho, Nathan, ZdNet, Blackmail ransomware returns with 1024-bit encryption key [Internet]. Available: https://web.archive.org/web/20080803000014/http://blogs.zdnet.com/security/?p=1251.
- J. Leyden, TheRegister, Russian cops cuff 10 ransomware Trojan suspects [Internet]. Available: https://www.theregister.com/2010/09/01/ransomware_trojan_suspects_cuffed/.
- G. Keizer, ComputerWorld, Ransomware squeezes users with bogus Windows activation demand [Internet]. Available: https://www.computerworld.com/article/2507340/ransomware-squeezes-userswith-bogus-windows-activation-demand.html.
- N. Hampton and Z. A. Baig, "Ransomware: Emergence of the yberextortion menace," in Proceedings of 13th Australian Information Security Management Conference, Perth, Australia, pp. 47-56, 2015. DOI: 10.4225/75/57b69aa9d938b.
- E. Protalinski, TNW, Criminals push ransomware hosted on GitHub and SourceForge pages by spamming 'fake nude pics' of celebrities [Internet]. Available: https://thenextweb.com/news/criminals-pushransomware-hosted-on-github-and-sourceforge-pages-by-spammingfake-nude-pics-of-celebrities.
- K. Jarvis, "CryptoLocker Ransomware," Viitattu 20, 2013. [Internet]. Available: https://www.secureworks.com/research/cryptolockerransomware.
- oel Hruska, EXTREMETECH, Synology NAS devices targeted by hackers, demand Bitcoin ransom to decrypt files [Internet]. Available: https://web.archive.org/web/20140819084648/http://www.extremetech.com/extreme/187518-synology-nas-devicestargeted-by-hackers-demand-bitcoin-ransom-to-decrypt-files.
- Lucian Constantin, PCWorld, Malvertising campaign delivers digitally signed CryptoWall ransomware [Internet]. Available: https://www.pcworld.com/article/435508/malvertising-campaign-deliversdigitally-signed-cryptowall-ransomware.html.
- Chris Brook, threatpost, Author Behind Ransomware Tox Calls it Quits, Sells Platform [Internet]. Available: https://threatpost.com/author-behind-ransomware-tox-calls-it-quits-sells-platform/113151/.
- SOPHOS, The current state of ransomware: CTB-Locker [Internet]. Available: https://news.sophos.com/en-us/2015/12/31/the-currentstate-of-ransomware-ctb-locker/.
- Q. Chen and R. A. Bridges, "Automated behavioral analysis of malware: A case study of WannaCry ransomware," in Proceedings of 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, Mexico, pp. 2017. DOI: 10.1109/ICMLA.2017.0-119.
- Lucian Constantin, CSO, Ryuk explained: Targeted, devastatingly effective ransomware [Internet]. Available: https://www.csoonline.com/article/3541810/ryuk-explained-targeted-devastatingly-effectiveransomware.html.
- Christopher Bing, Stephanie Kelly, REUTERS, Cyber attack shuts down U.S. fuel pipeline 'jugular,' Biden briefed [Internet]. Available: https://www.reuters.com/technology/colonial-pipelinehalts-all-pipeline-operations-after-cybersecurity-attack-2021-05-08/.
- John Fokker, McAfee, McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service - The All-Stars [Internet]. Available: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/mcafee-atranalyzes-sodinokibi-aka-revil-ransomware-as-a-service-the-all-stars/.
- N. Roberts, "Ransomware: An evolving threat," Ph. D. Dissertations, Utica College, NY, USA, 2018.
- Monica, P. Zavarsky, and D. Lindskog, "Experimental analysis of ransomware on windows and android platforms: Evolution and characterization," Procedia Computer Science, vol. 94, pp. 465-472, 2016. DOI: 10.1016/j.procs.2016.08.072.
- J. Snow, Kaspersky, Ransomware on mobile devices: knock-knockblock [Internet]. Available: https://www.kaspersky.com/blog/mobile-ransomware-2016/12491/.
- Philip Bates, MUO, Beware LeakerLocker: Ransomware That Locks Your Mobile [Internet]. Available: https://www.makeuseof.com/tag/beware-leakerlocker-ransomware-locks-mobile/.
- Alyac, Estsecurity, Mobile ransomware disguised as WannaCry ransomware screen appears [Internet]. Available: https://blog.alyac.co.kr/m/1140.
- KaVeh Waddell, The Computer Virus That Haunted Early AIDS Researchers, The Atlantic, 2016. [Internet]. Available: https://www.theatlantic.com/technology/archive/2016/05/the-computervirus-that-haunted-early-aids-researchers/481965/.
- SLocker. Spyware Remove [Internet]. Available: https://www.spywareremove.com/removeslocker.html.
- DomainTools. CovidLock Update: Deeper Analysis of Coronavirus Android Ransomware [Internet]. Available: https://www.domaintools.com/resources/blog/covidlock-update-coronavirus-ransomware.
- L. Kelion, Cryptolocker ransomware has 'infected about 250,000 PCs' [Internet]. Available: https://www.bbc.com/news/technology25506020.
- L. Stefanko, New ransomware posing as COVID-19 tracing app targets Canada; ESET offers decryptor [Internet]. Available: https://www.welivesecurity.com/2020/06/24/new-ransomware-uses-covid19-tracing-guise-target-canada-eset-decryptor/.
- Sauron Locker Ransomware [Internet]. Available: https://www.enigmasoftware.com/sauronlockerransomware-removal/.
- R. Lipovsky, L. Stefanko, D Engineer, Android Ransomware: from Android Defender to DoubleLocker, infotech report, 2018. [Internet]. Available: https://www.welivesecurity.com/post_paper/androidransomware-android-defender-doublelocker/