1 |
Microsoft, Cryptography Next Generation, Retrieved Jan., 23, 2017, from http://technet.microsoft.com/en-us/library/cc730763(v=ws.10).aspx
|
2 |
Microsoft, Business Productivity at Its Best - Office 2010 and SharePoint 2010 white paper, Retrieved Jan., 23, 2017, from http://technet.microsoft.com/en-us/library/ff384150(v=office.14).aspx
|
3 |
Microsoft, CNG DPAPI, Retrieved Jan., 23, 2017, from http://msdn.microsoft.com/en-us/library/windows/desktop/hh706794(v=vs.85).aspx
|
4 |
A. Young, "Cryptoviral extortion using Microsoft's Crypto API," J. IJIS, vol. 5, no. 2, pp. 67-76, Apr. 2006.
DOI
|
5 |
Symantec, How Trojan.Zbot.B!inf Uses Crypto API, Retrieved Jan., 23, 2017, from http://www.symantec.com/connect/blogs/how-trojanzbotbinf-uses-crypto-api
|
6 |
A. Young and M. Yung, An implementation of cryptoviral extortion using microsoft's crypto api, Retrieved Jan., 23, 2017, from http://www.cryptovirology.com/cryptovfiles/newbook/Chapter2.pdf
|
7 |
J. Song and I. Hwang, "A study on neutralization malicious code using Windows Crypto API and an implementation of Crypto API hooking tool," J. KIISC, vol. 21, no. 2, pp. 111-117, Apr. 2011.
|
8 |
K. Lee, Y. Lee, J. Park, I. You, and K. Yim, "Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)," in Proc. IMIS, pp. 709-713, Taichung, Taiwan, Jul. 2013.
|
9 |
W.-N. Kim, M.-S. Jang, J. Seo, and S. Kim, "Vulnerability discovery method based on control protocol fuzzing for a railway SCADA system," J. KICS, vol. 39, no. 4, pp. 362-369, Apr. 2014.
|
10 |
H. J. Kwon and S. J. Kim, "RFID distance bounding protocol secure against mafia and terroist fraud," J. KICS, vol 39, no. 11, pp. 660-674, Nov. 2014.
|
11 |
Y.-H. Goo, S.-O. Choi, S.-K. Lee, S.-M. Kim, and M.-S. Kim, "Tracking the source of cascading cyber attack traffic using network traffic analysis," J. KICS, vol. 41, no. 12, pp. 1771-1779, Dec. 2016.
DOI
|
12 |
K. Lee, I. You, and K. Yim, "Vulnerability analysis on the CNG crypto library," in Proc. IMIS, pp. 221-224, Blumenau, Brazil, Jul. 2015.
|