On Ransomware and Envisioning the Enemy of Tomorrow

We warned the public more than 20 years ago that cryptoviral extortion would pose a major threat to users, a threat that has been realized with the advent of Bitcoin but largely neglected until recently. We believe that a reactive mindset along with group conformity are partly to blame for this oversight and, moreover, are negatively impacting secure systems research. This presents a recipe for disaster, for while cryptoviral extortion is wreaking havoc on the surface, covert cryptovirology attacks are likely gathering strength within the shadows.

[1]  Moti Yung,et al.  Cryptovirology: extortion-based security threats and countermeasures , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[2]  S. Asch Opinions and Social Pressure , 1955, Nature.

[3]  Moti Yung,et al.  Cryptovirology , 2017, Commun. ACM.

[4]  Michael D. Smith,et al.  How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks , 2003, Financial Cryptography.

[5]  Adam L. Young Non-zero sum games and survivable malware , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[6]  Moti Yung,et al.  Malicious cryptography - exposing cryptovirology , 2004 .

[7]  David Naccache,et al.  On blind signatures and perfect crimes , 1992, Comput. Secur..