Blockchain-based semi-autonomous ransomware
Blockchain’s benefits and advantages have been extensively studied in literature, but far fewer works can be found on the dishonest uses of them. In this paper, we present the first blockchain-based ransomware schemes, which use smart contracts and simple cryptographic primitives to provide a limite...
Saved in:
Published in | Future generation computer systems Vol. 112; pp. 589 - 603 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.11.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Blockchain’s benefits and advantages have been extensively studied in literature, but far fewer works can be found on the dishonest uses of them. In this paper, we present the first blockchain-based ransomware schemes, which use smart contracts and simple cryptographic primitives to provide a limited degree of automation and fair exchange. Specifically, the use of smart contracts would enable new capabilities for ransomware, such as the possibility of paying for individual files or the refund of the ransom to the victim if the decryption keys are not received within a specified period of time. To demonstrate their feasibility, both technically and economically, these proposals have been implemented in the Ethereum Ropsten test network. The results show that running a full ransomware campaign similar to WannaCry, with more than 300,000 affected users, would have an additional cost of only 3 cents of a dollar per victim. Finally, we show that there are no feasible countermeasures if these schemes are implemented in public blockchains. Therefore, we firmly believe that it is increasingly urgent to recognize and study this matter, in order to create new policies and technical countermeasures.
•We present the first blockchain-based ransomware scheme.•The use of smart contracts enables new capabilities for ransomware.•We demonstrate that this idea is both economically and technically feasible.•There are no simple or realistic countermeasures. |
---|---|
AbstractList | Blockchain’s benefits and advantages have been extensively studied in literature, but far fewer works can be found on the dishonest uses of them. In this paper, we present the first blockchain-based ransomware schemes, which use smart contracts and simple cryptographic primitives to provide a limited degree of automation and fair exchange. Specifically, the use of smart contracts would enable new capabilities for ransomware, such as the possibility of paying for individual files or the refund of the ransom to the victim if the decryption keys are not received within a specified period of time. To demonstrate their feasibility, both technically and economically, these proposals have been implemented in the Ethereum Ropsten test network. The results show that running a full ransomware campaign similar to WannaCry, with more than 300,000 affected users, would have an additional cost of only 3 cents of a dollar per victim. Finally, we show that there are no feasible countermeasures if these schemes are implemented in public blockchains. Therefore, we firmly believe that it is increasingly urgent to recognize and study this matter, in order to create new policies and technical countermeasures.
•We present the first blockchain-based ransomware scheme.•The use of smart contracts enables new capabilities for ransomware.•We demonstrate that this idea is both economically and technically feasible.•There are no simple or realistic countermeasures. |
Author | Anguiano, Eloy Sierra-Cámara, José María Delgado-Mohatar, Oscar |
Author_xml | – sequence: 1 givenname: Oscar surname: Delgado-Mohatar fullname: Delgado-Mohatar, Oscar email: oscar.delgado@uam.es organization: Escuela Politécnica Superior, Universidad Autónoma de Madrid, Spain – sequence: 2 givenname: José María surname: Sierra-Cámara fullname: Sierra-Cámara, José María email: j.sierra@northeastern.edu organization: Khoury College of Computer Sciences, Northeastern University, USA – sequence: 3 givenname: Eloy surname: Anguiano fullname: Anguiano, Eloy email: eloy.anguiano@uam.es organization: Escuela Politécnica Superior, Universidad Autónoma de Madrid, Spain |
BookMark | eNp9j01LAzEURYNUsK3-AxfdS8aXzGQy3QharAoFNwruQj5eMLUzkWRG8d87ZVy7upt7D_csyKyLHRJyyaBgwOrrfeGHfkhYcOBQAC-glCdkzhrJqWRMzMh8rEkqy_XbGVnkvAcAJks2J1d3h2g_7LsOHTU6o1tlbAPVQx-72MYhr5Lucmy_dcJzcur1IePFXy7J6_b-ZfNId88PT5vbHbUl1D1lpuTCS6FZ5WpXSbEWzkvHpRCNFZW2jXCSe2O0q61HY6W1axCm5g0aKaBckmri2hRzTujVZwqtTj-KgToKq72ahNVRWAFXo_A4u5lmOH77CphUtgE7iy4ktL1yMfwP-AUCm2Nm |
CitedBy_id | crossref_primary_10_1016_j_cie_2023_109501 crossref_primary_10_1007_s10207_023_00700_3 crossref_primary_10_1109_ACCESS_2020_3034816 crossref_primary_10_1142_S0219691321500223 crossref_primary_10_1016_j_cose_2021_102490 crossref_primary_10_1016_j_procs_2024_06_098 crossref_primary_10_3390_math12010107 crossref_primary_10_1109_ACCESS_2022_3181278 crossref_primary_10_1109_ACCESS_2022_3218779 crossref_primary_10_1007_s11277_024_11115_1 |
Cites_doi | 10.2139/ssrn.2937641 10.1002/isaf.1424 10.1145/844340.844345 10.1016/S1353-4858(16)30086-1 10.1109/MITP.2017.3680961 10.1007/s12599-017-0499-8 10.1016/j.comnet.2011.08.005 10.1007/s10916-018-1007-5 10.4018/IJEGR.2018010103 |
ContentType | Journal Article |
Copyright | 2020 |
Copyright_xml | – notice: 2020 |
DBID | AAYXX CITATION |
DOI | 10.1016/j.future.2020.02.037 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-7115 |
EndPage | 603 |
ExternalDocumentID | 10_1016_j_future_2020_02_037 S0167739X19317406 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29H 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SES SEW SPC SPCBC SSV SSZ T5K UHS WUQ XPP ZMT ~G- AAXKI AAYXX AFJKZ CITATION |
ID | FETCH-LOGICAL-c306t-1b325f75a14d6d47595df7d27558c54ac85d72fbbad6cfebc7cc905b628eb7503 |
IEDL.DBID | AIKHN |
ISSN | 0167-739X |
IngestDate | Thu Sep 26 19:54:38 EDT 2024 Fri Feb 23 02:49:45 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Ransomware Blockchain Smart-contracts |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c306t-1b325f75a14d6d47595df7d27558c54ac85d72fbbad6cfebc7cc905b628eb7503 |
PageCount | 15 |
ParticipantIDs | crossref_primary_10_1016_j_future_2020_02_037 elsevier_sciencedirect_doi_10_1016_j_future_2020_02_037 |
PublicationCentury | 2000 |
PublicationDate | November 2020 2020-11-00 |
PublicationDateYYYYMMDD | 2020-11-01 |
PublicationDate_xml | – month: 11 year: 2020 text: November 2020 |
PublicationDecade | 2020 |
PublicationTitle | Future generation computer systems |
PublicationYear | 2020 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Khalil, Zamyatin, Felley, Moreno-Sanchez, Gervais (b10) 2018 S. Bowe, Pay-to-sudoku, URL Pilkington (b2) 2016 Brewer (b17) 2016; 2016 Shinde, der Veeken, Schooten, van den Berg (b24) 2016 Kumaresan, Bentov (b31) 2014 S. Bowe, Demostranting zero-knowledge contingent payments, URL Marino, Juels (b49) 2016 Gilad, Hemo, Micali, Vlachos, Zeldovich (b47) 2017 Joseph Poon (b48) 2017 Cryptocompare, URL Etherscan, URL Kshetri, Voas (b25) 2017; 19 Juels, Kosba, Shi (b4) 2016; 2016 [cited 24.10.2017]. Notheisen, Cholewa, Shanmugam (b8) 2017; 59 Mercaldo, Nardone, Santone, Visaggio (b23) 2016 Khan, Arshad, Khan (b11) 2018; 14 Atzei, Bartoletti, Cimoli (b50) 2017 Hanifatunnisa, Rahardjo (b12) 2017 Dannen (b3) 2017 Fuchsbauer (b43) 2017 G. Maxwell, The first successful zero-knowledge contingent payment, URL Kim, Laskowski (b14) 2018; 25 Kaur, Alam, Jameel, Mourya, Chang (b15) 2018; 42 V. Buterin, Ethereum white paper: A next generation smart contract & decentralized application platform, URL Kalita (b18) 2017 Pagnia, Gärtner (b39) 1999 Christin (b34) 2013 Young, Yung (b16) 1996 Conti, Gangwal, Ruj (b21) 2018 Ali, Clarke, Mccorry (b35) 2015 Kumaresan, Moran, Bentov (b30) 2015 Franzoni, Cárdenas, Almazan (b6) 2019 Eyal, Gencer, Sirer, Renesse (b5) 2016 Hernandez-Castro, Cartwright, Stepanova (b20) 2017 Küpçü, Lysyanskaya (b36) 2012; 56 Cheng, Lee, Chi, Chen (b7) 2018 Bentov, Kumaresan (b29) 2014 Liao, Zhao, Doupe, Ahn (b26) 2016 Yuan, Wang (b9) 2016 Tse, Zhang, Yang, Cheng, Mu (b13) 2017 J. Berr, ‘WannaCry’ ransomware attack losses could reach $4 billion, URL Jakobsson, Juels (b28) 1999 Spreitzenbarth, Freiling, Echtler, Schreck, Hoffmann (b22) 2013 [cited 07.01.2019]. Ray, Ray (b38) 2002; 3 Chaum, Fiat, Naor (b27) 1990 Nakamoto (b1) 2009 G. Wood, Ethereum: a secure decentralised generalised transaction ledger, URL M. Prince, Empty DDoS threats: Meet the armada collective, URL Parno, Howell, Gentry, Raykova (b44) 2013 Conti (10.1016/j.future.2020.02.037_b21) 2018 Kaur (10.1016/j.future.2020.02.037_b15) 2018; 42 Yuan (10.1016/j.future.2020.02.037_b9) 2016 Jakobsson (10.1016/j.future.2020.02.037_b28) 1999 Eyal (10.1016/j.future.2020.02.037_b5) 2016 Shinde (10.1016/j.future.2020.02.037_b24) 2016 Parno (10.1016/j.future.2020.02.037_b44) 2013 Joseph Poon (10.1016/j.future.2020.02.037_b48) 2017 Liao (10.1016/j.future.2020.02.037_b26) 2016 Fuchsbauer (10.1016/j.future.2020.02.037_b43) 2017 Tse (10.1016/j.future.2020.02.037_b13) 2017 Chaum (10.1016/j.future.2020.02.037_b27) 1990 Brewer (10.1016/j.future.2020.02.037_b17) 2016; 2016 10.1016/j.future.2020.02.037_b19 Kumaresan (10.1016/j.future.2020.02.037_b31) 2014 Atzei (10.1016/j.future.2020.02.037_b50) 2017 Pilkington (10.1016/j.future.2020.02.037_b2) 2016 Khan (10.1016/j.future.2020.02.037_b11) 2018; 14 Hanifatunnisa (10.1016/j.future.2020.02.037_b12) 2017 Khalil (10.1016/j.future.2020.02.037_b10) 2018 10.1016/j.future.2020.02.037_b42 10.1016/j.future.2020.02.037_b45 Gilad (10.1016/j.future.2020.02.037_b47) 2017 Nakamoto (10.1016/j.future.2020.02.037_b1) 2009 10.1016/j.future.2020.02.037_b46 Marino (10.1016/j.future.2020.02.037_b49) 2016 Kumaresan (10.1016/j.future.2020.02.037_b30) 2015 Franzoni (10.1016/j.future.2020.02.037_b6) 2019 Ray (10.1016/j.future.2020.02.037_b38) 2002; 3 Juels (10.1016/j.future.2020.02.037_b4) 2016; 2016 Young (10.1016/j.future.2020.02.037_b16) 1996 Notheisen (10.1016/j.future.2020.02.037_b8) 2017; 59 Mercaldo (10.1016/j.future.2020.02.037_b23) 2016 Ali (10.1016/j.future.2020.02.037_b35) 2015 Pagnia (10.1016/j.future.2020.02.037_b39) 1999 10.1016/j.future.2020.02.037_b40 Dannen (10.1016/j.future.2020.02.037_b3) 2017 10.1016/j.future.2020.02.037_b41 10.1016/j.future.2020.02.037_b32 10.1016/j.future.2020.02.037_b33 Kim (10.1016/j.future.2020.02.037_b14) 2018; 25 Hernandez-Castro (10.1016/j.future.2020.02.037_b20) 2017 Bentov (10.1016/j.future.2020.02.037_b29) 2014 10.1016/j.future.2020.02.037_b37 Kshetri (10.1016/j.future.2020.02.037_b25) 2017; 19 Christin (10.1016/j.future.2020.02.037_b34) 2013 Spreitzenbarth (10.1016/j.future.2020.02.037_b22) 2013 Küpçü (10.1016/j.future.2020.02.037_b36) 2012; 56 Cheng (10.1016/j.future.2020.02.037_b7) 2018 Kalita (10.1016/j.future.2020.02.037_b18) 2017 |
References_xml | – start-page: 421 year: 2014 end-page: 439 ident: b29 article-title: How to use bitcoin to design fair protocols publication-title: Advances in Cryptology – CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2014, Proceedings, Part II contributor: fullname: Kumaresan – start-page: 1 year: 2017 end-page: 6 ident: b12 article-title: Blockchain based e-voting recording system design publication-title: 2017 11th International Conference on Telecommunication Systems Services and Applications contributor: fullname: Rahardjo – year: 2017 ident: b3 article-title: Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners contributor: fullname: Dannen – start-page: 1046 year: 2018 end-page: 1051 ident: b7 article-title: Blockchain and smart contract for digital certificate publication-title: 2018 IEEE International Conference on Applied System Invention contributor: fullname: Chen – year: 2017 ident: b48 article-title: Plasma : Scalable autonomous smart contracts contributor: fullname: Joseph Poon – volume: 2016 start-page: 358 year: 2016 ident: b4 article-title: The ring of gyges: Investigating the future of criminal smart contracts publication-title: IACR Cryptol. ePrint Arch. contributor: fullname: Shi – start-page: 2663 year: 2016 end-page: 2668 ident: b9 article-title: Towards blockchain-based intelligent transportation systems publication-title: 2016 IEEE 19th International Conference on Intelligent Transportation Systems contributor: fullname: Wang – start-page: 164 year: 2017 end-page: 186 ident: b50 article-title: A survey of attacks on ethereum smart contracts SoK publication-title: Proceedings of the 6th International Conference on Principles of Security and Trust, Vol. 10204 contributor: fullname: Cimoli – volume: 19 start-page: 11 year: 2017 end-page: 15 ident: b25 article-title: Do crypto-currencies fuel ransomware? publication-title: IT Prof. contributor: fullname: Voas – year: 2017 ident: b18 article-title: WannaCry Ransomware Attack: Protect Yourself from WannaCry Ransomware Cyber Risk and Cyber War contributor: fullname: Kalita – volume: 42 start-page: 156 year: 2018 ident: b15 article-title: A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment publication-title: J. Med. Syst. contributor: fullname: Chang – start-page: 319 year: 1990 end-page: 327 ident: b27 article-title: Untraceable electronic cash publication-title: Advances in Cryptology — CRYPTO’ 88: Proceedings contributor: fullname: Naor – start-page: 45 year: 2016 end-page: 59 ident: b5 article-title: Bitcoin-NG: A scalable blockchain protocol publication-title: 13th USENIX Symposium on Networked Systems Design and Implementation contributor: fullname: Renesse – year: 2018 ident: b10 article-title: Commit-Chains: Secure, Scalable Off-Chain Payments, Cryptology ePrint Archive contributor: fullname: Gervais – volume: 2016 start-page: 5 year: 2016 end-page: 9 ident: b17 article-title: Ransomware attacks publication-title: Netw. Secur. contributor: fullname: Brewer – start-page: 151 year: 2016 end-page: 166 ident: b49 article-title: Setting standards for altering and undoing smart contracts publication-title: Rule Technologies. Research, Tools, and Applications contributor: fullname: Juels – year: 2016 ident: b2 article-title: Blockchain technology: principles and applications publication-title: Research Handbook on Digital Transformations contributor: fullname: Pilkington – start-page: 283 year: 2015 end-page: 293 ident: b35 article-title: Bitcoin: Perils of an unregulated global P2P currency publication-title: Revised Selected Papers of the 23rd International Workshop on Security Protocols XXIII, Vol. 9379 contributor: fullname: Mccorry – volume: 14 start-page: 53 year: 2018 end-page: 62 ident: b11 article-title: Secure digital voting system based on blockchain technology publication-title: Int. J. Electron. Gov. Res. contributor: fullname: Khan – year: 2018 ident: b21 article-title: On the economic significance of ransomware campaigns: A bitcoin transactions perspective contributor: fullname: Ruj – start-page: 195 year: 2015 end-page: 206 ident: b30 article-title: How to use bitcoin to play decentralized poker publication-title: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security contributor: fullname: Bentov – start-page: 30 year: 2014 end-page: 41 ident: b31 article-title: How to use bitcoin to incentivize correct computations publication-title: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security contributor: fullname: Bentov – start-page: 258 year: 1999 end-page: 272 ident: b28 article-title: Proofs of work and bread pudding protocols publication-title: Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security contributor: fullname: Juels – start-page: 212 year: 2016 end-page: 221 ident: b23 article-title: Ransomware steals your phone. formal methods rescue it publication-title: 36th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, Vol. 9688 contributor: fullname: Visaggio – start-page: 129 year: 1996 end-page: 140 ident: b16 article-title: Cryptovirology: extortion-based security threats and countermeasures publication-title: Proceedings 1996 IEEE Symposium on Security and Privacy contributor: fullname: Yung – year: 2013 ident: b44 article-title: Pinocchio: Nearly practical verifiable computation publication-title: Proceedings of the IEEE Symposium on Security and Privacy contributor: fullname: Raykova – start-page: 51 year: 2017 end-page: 68 ident: b47 article-title: Algorand: Scaling byzantine agreements for cryptocurrencies publication-title: Proceedings of the 26th Symposium on Operating Systems Principles contributor: fullname: Zeldovich – year: 1999 ident: b39 article-title: On the Impossibility of Fair Exchange Without a Trusted Third Party contributor: fullname: Gärtner – year: 2017 ident: b20 article-title: Economic analysis of ransomware publication-title: SSRN Electron. J. contributor: fullname: Stepanova – volume: 56 start-page: 50 year: 2012 end-page: 63 ident: b36 article-title: Usable optimistic fair exchange publication-title: Comput. Netw. contributor: fullname: Lysyanskaya – volume: 25 start-page: 18 year: 2018 end-page: 27 ident: b14 article-title: Toward an ontology-driven blockchain design for supply-chain provenance publication-title: Intell. Syst. Account. Financ. Manage. contributor: fullname: Laskowski – year: 2017 ident: b43 article-title: Subversion-Zero-Knowledge SNARKs, Cryptology ePrint Archive contributor: fullname: Fuchsbauer – start-page: 217 year: 2019 end-page: 218 ident: b6 article-title: Using blockchain to store teachers’ certification in basic education in Mexico publication-title: 2019 IEEE 19th International Conference on Advanced Learning Technologies, Vol. 2161-377X contributor: fullname: Almazan – start-page: 1808 year: 2013 end-page: 1815 ident: b22 article-title: Mobile-sandbox: Having a deeper look into android applications publication-title: Proceedings of the 28th Annual ACM Symposium on Applied Computing contributor: fullname: Hoffmann – start-page: 1 year: 2016 end-page: 13 ident: b26 article-title: Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin publication-title: 2016 APWG Symposium on Electronic Crime Research contributor: fullname: Ahn – start-page: 90 year: 2016 end-page: 95 ident: b24 article-title: Ransomware: Studying transfer and mitigation publication-title: 2016 International Conference on Computing, Analytics and Security Trends contributor: fullname: van den Berg – year: 2009 ident: b1 article-title: Bitcoin: A peer-to-peer electronic cash system contributor: fullname: Nakamoto – volume: 3 start-page: 9 year: 2002 end-page: 17 ident: b38 article-title: Fair exchange in E-commerce publication-title: SIGecom Exch. contributor: fullname: Ray – volume: 59 start-page: 425 year: 2017 end-page: 440 ident: b8 article-title: Trading real-world assets on blockchain publication-title: Bus. Inf. Syst. Eng. contributor: fullname: Shanmugam – start-page: 1357 year: 2017 end-page: 1361 ident: b13 article-title: Blockchain application in food supply information security publication-title: 2017 IEEE International Conference on Industrial Engineering and Engineering Management contributor: fullname: Mu – start-page: 213 year: 2013 end-page: 224 ident: b34 article-title: Traveling the silk road: A measurement analysis of a large anonymous online marketplace publication-title: Proceedings of the 22Nd International Conference on World Wide Web contributor: fullname: Christin – start-page: 1046 year: 2018 ident: 10.1016/j.future.2020.02.037_b7 article-title: Blockchain and smart contract for digital certificate contributor: fullname: Cheng – start-page: 421 year: 2014 ident: 10.1016/j.future.2020.02.037_b29 article-title: How to use bitcoin to design fair protocols contributor: fullname: Bentov – ident: 10.1016/j.future.2020.02.037_b46 – ident: 10.1016/j.future.2020.02.037_b42 – start-page: 319 year: 1990 ident: 10.1016/j.future.2020.02.037_b27 article-title: Untraceable electronic cash contributor: fullname: Chaum – year: 2017 ident: 10.1016/j.future.2020.02.037_b20 article-title: Economic analysis of ransomware publication-title: SSRN Electron. J. doi: 10.2139/ssrn.2937641 contributor: fullname: Hernandez-Castro – year: 2016 ident: 10.1016/j.future.2020.02.037_b2 article-title: Blockchain technology: principles and applications contributor: fullname: Pilkington – ident: 10.1016/j.future.2020.02.037_b32 – start-page: 129 year: 1996 ident: 10.1016/j.future.2020.02.037_b16 article-title: Cryptovirology: extortion-based security threats and countermeasures contributor: fullname: Young – start-page: 283 year: 2015 ident: 10.1016/j.future.2020.02.037_b35 article-title: Bitcoin: Perils of an unregulated global P2P currency contributor: fullname: Ali – year: 2018 ident: 10.1016/j.future.2020.02.037_b10 contributor: fullname: Khalil – start-page: 213 year: 2013 ident: 10.1016/j.future.2020.02.037_b34 article-title: Traveling the silk road: A measurement analysis of a large anonymous online marketplace contributor: fullname: Christin – start-page: 151 year: 2016 ident: 10.1016/j.future.2020.02.037_b49 article-title: Setting standards for altering and undoing smart contracts contributor: fullname: Marino – start-page: 1 year: 2017 ident: 10.1016/j.future.2020.02.037_b12 article-title: Blockchain based e-voting recording system design contributor: fullname: Hanifatunnisa – ident: 10.1016/j.future.2020.02.037_b33 – volume: 25 start-page: 18 issue: 1 year: 2018 ident: 10.1016/j.future.2020.02.037_b14 article-title: Toward an ontology-driven blockchain design for supply-chain provenance publication-title: Intell. Syst. Account. Financ. Manage. doi: 10.1002/isaf.1424 contributor: fullname: Kim – ident: 10.1016/j.future.2020.02.037_b37 – volume: 2016 start-page: 358 year: 2016 ident: 10.1016/j.future.2020.02.037_b4 article-title: The ring of gyges: Investigating the future of criminal smart contracts publication-title: IACR Cryptol. ePrint Arch. contributor: fullname: Juels – ident: 10.1016/j.future.2020.02.037_b19 – start-page: 90 year: 2016 ident: 10.1016/j.future.2020.02.037_b24 article-title: Ransomware: Studying transfer and mitigation contributor: fullname: Shinde – ident: 10.1016/j.future.2020.02.037_b40 – year: 2017 ident: 10.1016/j.future.2020.02.037_b3 contributor: fullname: Dannen – start-page: 45 year: 2016 ident: 10.1016/j.future.2020.02.037_b5 article-title: Bitcoin-NG: A scalable blockchain protocol contributor: fullname: Eyal – start-page: 2663 year: 2016 ident: 10.1016/j.future.2020.02.037_b9 article-title: Towards blockchain-based intelligent transportation systems contributor: fullname: Yuan – year: 2013 ident: 10.1016/j.future.2020.02.037_b44 article-title: Pinocchio: Nearly practical verifiable computation contributor: fullname: Parno – year: 1999 ident: 10.1016/j.future.2020.02.037_b39 contributor: fullname: Pagnia – start-page: 1808 year: 2013 ident: 10.1016/j.future.2020.02.037_b22 article-title: Mobile-sandbox: Having a deeper look into android applications contributor: fullname: Spreitzenbarth – start-page: 195 year: 2015 ident: 10.1016/j.future.2020.02.037_b30 article-title: How to use bitcoin to play decentralized poker contributor: fullname: Kumaresan – volume: 3 start-page: 9 issue: 2 year: 2002 ident: 10.1016/j.future.2020.02.037_b38 article-title: Fair exchange in E-commerce publication-title: SIGecom Exch. doi: 10.1145/844340.844345 contributor: fullname: Ray – volume: 2016 start-page: 5 issue: 9 year: 2016 ident: 10.1016/j.future.2020.02.037_b17 article-title: Ransomware attacks publication-title: Netw. Secur. doi: 10.1016/S1353-4858(16)30086-1 contributor: fullname: Brewer – ident: 10.1016/j.future.2020.02.037_b45 – year: 2009 ident: 10.1016/j.future.2020.02.037_b1 contributor: fullname: Nakamoto – year: 2018 ident: 10.1016/j.future.2020.02.037_b21 contributor: fullname: Conti – start-page: 258 year: 1999 ident: 10.1016/j.future.2020.02.037_b28 article-title: Proofs of work and bread pudding protocols contributor: fullname: Jakobsson – year: 2017 ident: 10.1016/j.future.2020.02.037_b18 contributor: fullname: Kalita – volume: 19 start-page: 11 issue: 5 year: 2017 ident: 10.1016/j.future.2020.02.037_b25 article-title: Do crypto-currencies fuel ransomware? publication-title: IT Prof. doi: 10.1109/MITP.2017.3680961 contributor: fullname: Kshetri – start-page: 1 year: 2016 ident: 10.1016/j.future.2020.02.037_b26 article-title: Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin contributor: fullname: Liao – start-page: 217 year: 2019 ident: 10.1016/j.future.2020.02.037_b6 article-title: Using blockchain to store teachers’ certification in basic education in Mexico contributor: fullname: Franzoni – ident: 10.1016/j.future.2020.02.037_b41 – volume: 59 start-page: 425 issue: 6 year: 2017 ident: 10.1016/j.future.2020.02.037_b8 article-title: Trading real-world assets on blockchain publication-title: Bus. Inf. Syst. Eng. doi: 10.1007/s12599-017-0499-8 contributor: fullname: Notheisen – year: 2017 ident: 10.1016/j.future.2020.02.037_b43 contributor: fullname: Fuchsbauer – start-page: 1357 year: 2017 ident: 10.1016/j.future.2020.02.037_b13 article-title: Blockchain application in food supply information security contributor: fullname: Tse – volume: 56 start-page: 50 issue: 1 year: 2012 ident: 10.1016/j.future.2020.02.037_b36 article-title: Usable optimistic fair exchange publication-title: Comput. Netw. doi: 10.1016/j.comnet.2011.08.005 contributor: fullname: Küpçü – start-page: 30 year: 2014 ident: 10.1016/j.future.2020.02.037_b31 article-title: How to use bitcoin to incentivize correct computations contributor: fullname: Kumaresan – volume: 42 start-page: 156 issue: 8 year: 2018 ident: 10.1016/j.future.2020.02.037_b15 article-title: A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment publication-title: J. Med. Syst. doi: 10.1007/s10916-018-1007-5 contributor: fullname: Kaur – year: 2017 ident: 10.1016/j.future.2020.02.037_b48 contributor: fullname: Joseph Poon – volume: 14 start-page: 53 issue: 1 year: 2018 ident: 10.1016/j.future.2020.02.037_b11 article-title: Secure digital voting system based on blockchain technology publication-title: Int. J. Electron. Gov. Res. doi: 10.4018/IJEGR.2018010103 contributor: fullname: Khan – start-page: 212 year: 2016 ident: 10.1016/j.future.2020.02.037_b23 article-title: Ransomware steals your phone. formal methods rescue it contributor: fullname: Mercaldo – start-page: 164 year: 2017 ident: 10.1016/j.future.2020.02.037_b50 article-title: A survey of attacks on ethereum smart contracts SoK contributor: fullname: Atzei – start-page: 51 year: 2017 ident: 10.1016/j.future.2020.02.037_b47 article-title: Algorand: Scaling byzantine agreements for cryptocurrencies contributor: fullname: Gilad |
SSID | ssj0001731 |
Score | 2.438497 |
Snippet | Blockchain’s benefits and advantages have been extensively studied in literature, but far fewer works can be found on the dishonest uses of them. In this... |
SourceID | crossref elsevier |
SourceType | Aggregation Database Publisher |
StartPage | 589 |
SubjectTerms | Blockchain Ransomware Smart-contracts |
Title | Blockchain-based semi-autonomous ransomware |
URI | https://dx.doi.org/10.1016/j.future.2020.02.037 |
Volume | 112 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LSsNAFL3UduPGt1gfJQt3MjZJZzLJshZLVehGC90N8wpW6YOa4s5v904yEQVx4TKBCckZcs65zH0AXOooz9I4M4RbKgla6pCkVmZEIRPqlHFFVZltMU5GE3o_ZdMGDOpaGJdW6bm_4vSSrf2drkezu5rNuo8ugZ73silaELTVru12C-WI0ia0-ncPo_EXIUfcjyVETnAL6gq6Ms2rat2BgWIcls073UD03xTqm-oM92DH28WgX73RPjTs4gB261EMgf8zD-HqBkXpVT9jnE-cMJngzc5nRG4KV7SA0X3gNGk5f5drewST4e3TYET8HASi0dAXJFK9mOWcyYiaxLgGfczk3MScsVQzKhFTw-NcKWkSnVuludZZyFQSp1a5c8pjaC6WC3sCgcwTazKqo155QmqUVWGaa8Xx0bmxpg2k_naxqtpdiDoP7EVUWAmHlQhjgVi1gdcAiR_bJpCR_1x5-u-VZ7DtrqqCwHNoFuuNvUBnUKgObF1_RB2__5_-mLnL |
link.rule.ids | 315,786,790,4521,24144,27955,27956,45618,45712 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwEB1V7QEu7Iiy5sANWU3cOE6OpaJKaemFVurN8ioK6qLSit_HThwEEuLANdZEzkvy5o08C8CtjEyW4kwhqmOOrKQOUap5hoRlQpkSKmJRZFuMknwSP07JtAbdqhbGpVV67i85vWBrf6Xl0WytZrPWs0ugp-1saiWIldWu7XYjJjTCdWh0-oN89EXIEfVjCS0nOIOqgq5I8ypbd9hAEYdF8043EP03D_XN6_QOYM_LxaBT7ugQanpxBPvVKIbA_5nHcHdvndKbfLFxPnKOSQXvej5DfLtxRQs2ug-cT1rOP_han8Ck9zDu5sjPQUDSCvoNikQbE0MJj2KVKNegjyhDFaaEpJLE3GKqKDZCcJVIo4WkUmYhEQlOtXDnlKdQXywX-gwCbhKtslhG7eKEVAktwtRIQe2tjdKqCah6drYq212wKg_slZVYMYcVCzGzWDWBVgCxH6-NWUb-0_L835Y3sJOPn4Zs2B8NLmDXrZTFgZdQ36y3-sqqhI249l_BJ3s0u7s |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Blockchain-based+semi-autonomous+ransomware&rft.jtitle=Future+generation+computer+systems&rft.au=Delgado-Mohatar%2C+Oscar&rft.au=Sierra-C%C3%A1mara%2C+Jos%C3%A9+Mar%C3%ADa&rft.au=Anguiano%2C+Eloy&rft.date=2020-11-01&rft.pub=Elsevier+B.V&rft.issn=0167-739X&rft.eissn=1872-7115&rft.volume=112&rft.spage=589&rft.epage=603&rft_id=info:doi/10.1016%2Fj.future.2020.02.037&rft.externalDocID=S0167739X19317406 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon |