Crypto-ransomware aims at extorting money from users by encrypting their files and asking them to pay for the decryption key. We present Ranflood; a configurable drop-in solution that contrasts ransomware attacks with a deluge of decoy files at specific locations (e.g., sensitive folders of the user, the attack site), deceiving the attacker...
-
February 2024 (v1)Journal articleUploaded on: December 29, 2023
-
2022 (v1)Journal article
Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus : it is spread over many venues and composed of contributions mainly addressing...
Uploaded on: February 22, 2023 -
August 2023 (v1)Journal article
Ransomware is one of the most infamous kinds of malware, particularly the "crypto" subclass, which encrypts users' files, asking for some monetary ransom in exchange for the decryption key. Recently, crypto-ransomware grew into a scourge for enterprises and governmental institutions. The most recent and impactful cases include an oil company in...
Uploaded on: January 10, 2024