Content area

Abstract

This paper presents the experimental results that were obtained by implementing the payload of a cryptovirus on the Microsoft Windows platform. The attack is based entirely on the Microsoft Cryptographic API and the needed API calls are covered in detail. More specifically, it is shown that by using eight types of API calls and 72 lines of C code, the payload can hybrid encrypt sensitive data and hold it hostage. Benchmarks are also given. A novel countermeasure against cryptoviral extortion attacks is shown that forces the API caller to demonstrate that an authorized party can recover the asymmetrically encrypted data. [PUBLICATION ABSTRACT]

Details

Title
Cryptoviral extortion using Microsoft's Crypto API
Author
Young, Adam L
Pages
67-76
Publication year
2006
Publication date
Apr 2006
Publisher
Springer Nature B.V.
ISSN
16155262
e-ISSN
16155270
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
227317748
Copyright
Springer-Verlag 2006