C&C Servers? Too Risky! Android Botnet Goes with Twitter Instead), https://www.bleepingcomputer.com/news/security/ candc-servers-too-risky-android-botnet-goes-with-twitter-instead, 2016. ,
Teoria statistica delle classi e calcolo delle probabilita, Libreria internazionale Seeber, 1936. ,
Microsoft Announces Controlled Folder Access to Fend Off Crypto- Ransomware. https://www.bleepingcomputer.com/news/microsoft/microsoft- announces-controlled-folder-access-to-fend-off-crypto-ransomware, 2017. ,
The Free and Open Source Software for Disk Imaging and Cloning ,
ShieldFS, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC '16, pp.336-347, 2016. ,
DOI : 10.1109/SECPRI.1996.502676
, , 2013.
CrystalDiskMark is a disk benchmark software ,
, Digital Corpora: Producing the Digital Body
New benchmarks, redesigned interface, http://geekbench.com/ 10. GNU Octave: Scientific Programming Language ,
How to defend your website with ZIP bombs. https://blog.haschek. at/2017/how-to-defend-your-website-with-zip-bombs.html, 2017. ,
The first cryptor to exploit Telegram), https://securelist.com/blog/research/76558/the-first-cryptor- to-exploit-telegram, 2016. ,
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware, Proceedings of the 25th USENIX Security Symposium, pp.757-772, 2016. ,
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp.3-24, 2015. ,
DOI : 10.1007/978-3-319-20550-2_1
PayBreak, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17, pp.599-611, 2017. ,
DOI : 10.1109/SECPRI.1996.502676
, Malekal: Malware Repository
An Efficient Approach to Detect Torrent- Locker Ransomware in Computer Systems, International Conference on Cryptology and Network Security, pp.532-541, 2016. ,
DOI : 10.1007/978-3-319-48965-0_32
, Microsoft: File System Minifilter Drivers
Windows Performance Toolkit, https://msdn.microsoft.com/en-us/ windows ,
Ransomware and the Legacy Crypto API, The 11th International Conference on Risks and Security of Internet and Systems, 2016. ,
DOI : 10.1007/978-3-540-68351-3_8
URL : https://hal.archives-ouvertes.fr/hal-01388056
, The Complete Benchmark for Windows 8.1, Windows 8 and Windows 7, https://www.futuremark.com/benchmarks/pcmark 22. PolarToffee: Found a sample of the AES-NI ransomware, PCMark, vol.8, 2017.
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp.303-312, 2016. ,
DOI : 10.1109/ICDCS.2016.46
AVclass: A Tool for Massive Malware Labeling, International Symposium on Research in Attacks, Intrusions, and Defenses, pp.230-253, 2016. ,
DOI : 10.1109/SP.2012.16
, Annual Threat Report. Tech. rep., SonicWall, 2017.
Trend Micro: CryLocker Uses Imgur as C&C, 2016. ,
, http://blog.trendmicro.com/trendlabs-security-intelligence/cerber- starts-evading-machine-learning, 2017.
, Viper: Binary management and analysis framework
, VirusShare: Malware Repository
Towards Generic Ransomware Detection, 2016. ,
Cryptovirology: extortion-based security threats and countermeasures, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.129-140, 1996. ,
DOI : 10.1109/SECPRI.1996.502676
An implementation of Cryptoviral Extortion Using Microsoft's Crypto API, CiteSeerX, 2005. ,