Examination of a New Defense Mechanism: Honeywords ZA Genc, S Kardas, MS Kiraz | 62* | |
No random, no ransom: a key to stop cryptographic ransomware ZA Genç, G Lenzini, PYA Ryan Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018 | 54 | 2018 |
On deception-based protection against cryptographic ransomware ZA Genç, G Lenzini, D Sgandurra Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 42 | 2019 |
Next generation cryptographic ransomware ZA Genç, G Lenzini, PYA Ryan Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway …, 2018 | 24 | 2018 |
“The simplest protocol for oblivious transfer” revisited ZA Genç, V Iovino, A Rial Information Processing Letters 161, 105975, 2020 | 19 | 2020 |
Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer MS Kiraz, ZA Genç, S Kardas Security and Communication Networks 8 (18), 4123-4135, 2015 | 19 | 2015 |
Detecting large integer arithmetic for defense against crypto ransomware MS Kiraz, ZA Genç, E Öztürk Cryptology ePrint Archive, 2017 | 15 | 2017 |
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware ZA Genç, G Lenzini, PYA Ryan Emerging Technologies for Authorization and Authentication: Second …, 2020 | 14 | 2020 |
Security analysis of key acquiring strategies used by cryptographic ransomware ZA Genç, G Lenzini, PYA Ryan Proceedings of the Central European Cybersecurity Conference 2018, 1-6, 2018 | 14 | 2018 |
The cipher, the random and the ransom: a survey on current and future ransomware ZA Genç, G Lenzini, P Ryan Central European Cybersecurity Conference, 2017 | 14 | 2017 |
Analysis, detection, and prevention of cryptographic ransomware ZA Genç Unilu-University of Luxembourg, Luxembourg, Luxembourg, 2020 | 7 | 2020 |
A security analysis, and a fix, of a code-corrupted honeywords system ZA Genç, G Lenzini, P Ryan, I Vazquez Sandoval 4th International Conference on Information Systems Security and Privacy, 2018 | 7 | 2018 |
Practical exchange for unique digital goods O Ersoy, ZA Genç, Z Erkin, M Conti 2021 IEEE International Conference on Decentralized Applications and …, 2021 | 5 | 2021 |
A game of" Cut and Mouse" bypassing antivirus by simulating user inputs ZA Genç, G Lenzini, D Sgandurra Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 5 | 2019 |
A critical security analysis of the password-based authentication honeywords system under code-corruption attack ZA Genç, G Lenzini, PYA Ryan, I Vazquez Sandoval Information Systems Security and Privacy: 4th International Conference …, 2019 | 5 | 2019 |
Security attacks and enhancements to chaotic map-based RFID authentication protocols S Kardaş, ZA Genç Wireless Personal Communications 98, 1135-1154, 2018 | 4 | 2018 |
Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence ZA Genç, G Lenzini 6th International Conference on Information Systems Security and Privacy …, 2020 | 3 | 2020 |
Method for preventing ransomware attacks on computing systems ZA Genc, G Lenzini, PYA Ryan US Patent 11,620,380, 2023 | 2 | 2023 |
Cut-and-mouse and ghost control: Exploiting antivirus software with synthesized inputs ZA Genç, G Lenzini, D Sgandurra Digital Threats: Research and Practice 2 (1), 1-23, 2021 | 2 | 2021 |
A game of “cut and mouse” ZA Genç, G Lenzini, D Sgandurra Proceedings of the 35th Annual Computer Security Applications Conference, ACM, 2019 | 1 | 2019 |