The Future of the Ransomware11. April 2018
10:00 Uhr (bis 11.00 Uhr)
FernUniversität, Gebäude 3, Raum 2 (EG), Universitätsstr. 11, 58097 Hagen
Ziya Alper Genç
is a current PhD student at University of Luxembourg. His main reserach interests include defending mechanisms against ransomware, cryptographic protocols, and (biometric and password-based) secure authentication schemes.
Dr. Osmanbey Uzunkol
In diesem Vortrag wird darüber berichtet, wie die Entwicklung der Ransomware-Angriffe ist, und welche Gegenmaßnahmen nebst deren Schwächen, Starken, und Einschränkungen derzeit existieren. Ferner werden die künftigen Angriffsbereiche der neuartigen Ransomwares erläutert.
Although conceptually not new, ransomware recently regained attraction in the cybersecurity community: notorious attacks in fact have caused serious damage, proving their disruptive effect. This is likely just the beginning of a new era. According to a recent intelligence report by Cybersecurity Ventures, the total cost due to ransomware attacks is predicted to exceed $5 billion in 2017. How can this disruptive threat can be contained? Current anti-ransomware solutions are effective only against existing threats, and the worst is yet to come. Cyber criminals will design and deploy more sophisticated strategies, overcoming current defenses and, as it commonly happens in security, defenders and attackers will embrace a competition that will never end. In this arm race, anticipating how current ransomware will evolve may help at least being prepared for some future damage.
In this talk, we will begin with describing the ransomware threat and state its attack characteristics. Next, we will explain the existing techniques to mitigate this threat and discuss their limitations. We will continue by giving high-level descriptions of advanced techniques that ransomware may utilize to defeat existing defense systems. Finally, we will point out new areas that ransomware may exploit and extend the attack surface that next generation ransomware may target. In each discussion, real world incidents will be presented to support our observations. Participants will be able to list different defense techniques used against ransomware threat and identify the strong and weak points in each of them.