1 |
"Trends of ransomware in 2016 and its outlook for next year," Korea Internet & Security Agency, Jan. 2017.
|
2 |
"Trends report on cyber threat in the third quarter 2017," Korea Internet & Security Agency, Oct. 2017.
|
3 |
Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda, "Unveil: a large-scale, automated approach to detecting ransomware," Proceedings of the 25th USENIX Security Symposium, pp. 757-772, Aug. 2016.
|
4 |
Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo, "Baiting inside attackers using decoy documents," ADA500672, Department of Computer Science, Columbia University, Sep. 2008.
|
5 |
Jae-Yeol Kim, "A study on the recovery of ransomware infected file through re- al-time file behavior analysis," Master's Thesis, Korea University, May. 2017.
|
6 |
"Advanced encryption standard (AES)," Federal Information Processing Standards Publication 197, Nov. 2001.
|
7 |
D. Hong, D. Kim, and D. Kwon, " 128-Bit block cipher LEA," TTAK.KO-12.0223, Dec. 2013.
|
8 |
Deukjo Hong, Jung-Keun Lee, Dong-Chan Kim, Daesung Kwon, Kwon Ho Ryu, and Dong-Geon Lee, "LEA: a 128-bit block cipher for fast encryption on common processors," Proceedings of the WISA 2013, pp. 3-27, Aug. 2013.
|
9 |
S. Lee, Y. Yeom, H. Park, and H. Kim, "64-Bit block cipher HIGHT," TTAK.KO-12.0040/R1, Dec. 2008.
|
10 |
"Wannacry report," https://www.pandasecurity.com/mediacenter/src/uploads/2017/05/WannaCry_Report-en.pdf
|
11 |
"Linux security: a closer look at the latest linux threats," https://www.trendmicro.com/vinfo/us/security/news/cybercrimeand-digital-threats/linux-security-a-closer-look-at-the-latest-linux-threats
|
12 |
"Mamba ransomware allows riders free e ntry to San Francisco Muni," https://usa.kaspersky.com/blog/mamba-hddcryptor-ransomware/10519/
|