Blockchain-based semi-autonomous ransomware

Blockchain’s benefits and advantages have been extensively studied in literature, but far fewer works can be found on the dishonest uses of them. In this paper, we present the first blockchain-based ransomware schemes, which use smart contracts and simple cryptographic primitives to provide a limite...

Full description

Saved in:
Bibliographic Details
Published inFuture generation computer systems Vol. 112; pp. 589 - 603
Main Authors Delgado-Mohatar, Oscar, Sierra-Cámara, José María, Anguiano, Eloy
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.11.2020
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Blockchain’s benefits and advantages have been extensively studied in literature, but far fewer works can be found on the dishonest uses of them. In this paper, we present the first blockchain-based ransomware schemes, which use smart contracts and simple cryptographic primitives to provide a limited degree of automation and fair exchange. Specifically, the use of smart contracts would enable new capabilities for ransomware, such as the possibility of paying for individual files or the refund of the ransom to the victim if the decryption keys are not received within a specified period of time. To demonstrate their feasibility, both technically and economically, these proposals have been implemented in the Ethereum Ropsten test network. The results show that running a full ransomware campaign similar to WannaCry, with more than 300,000 affected users, would have an additional cost of only 3 cents of a dollar per victim. Finally, we show that there are no feasible countermeasures if these schemes are implemented in public blockchains. Therefore, we firmly believe that it is increasingly urgent to recognize and study this matter, in order to create new policies and technical countermeasures. •We present the first blockchain-based ransomware scheme.•The use of smart contracts enables new capabilities for ransomware.•We demonstrate that this idea is both economically and technically feasible.•There are no simple or realistic countermeasures.
AbstractList Blockchain’s benefits and advantages have been extensively studied in literature, but far fewer works can be found on the dishonest uses of them. In this paper, we present the first blockchain-based ransomware schemes, which use smart contracts and simple cryptographic primitives to provide a limited degree of automation and fair exchange. Specifically, the use of smart contracts would enable new capabilities for ransomware, such as the possibility of paying for individual files or the refund of the ransom to the victim if the decryption keys are not received within a specified period of time. To demonstrate their feasibility, both technically and economically, these proposals have been implemented in the Ethereum Ropsten test network. The results show that running a full ransomware campaign similar to WannaCry, with more than 300,000 affected users, would have an additional cost of only 3 cents of a dollar per victim. Finally, we show that there are no feasible countermeasures if these schemes are implemented in public blockchains. Therefore, we firmly believe that it is increasingly urgent to recognize and study this matter, in order to create new policies and technical countermeasures. •We present the first blockchain-based ransomware scheme.•The use of smart contracts enables new capabilities for ransomware.•We demonstrate that this idea is both economically and technically feasible.•There are no simple or realistic countermeasures.
Author Anguiano, Eloy
Sierra-Cámara, José María
Delgado-Mohatar, Oscar
Author_xml – sequence: 1
  givenname: Oscar
  surname: Delgado-Mohatar
  fullname: Delgado-Mohatar, Oscar
  email: oscar.delgado@uam.es
  organization: Escuela Politécnica Superior, Universidad Autónoma de Madrid, Spain
– sequence: 2
  givenname: José María
  surname: Sierra-Cámara
  fullname: Sierra-Cámara, José María
  email: j.sierra@northeastern.edu
  organization: Khoury College of Computer Sciences, Northeastern University, USA
– sequence: 3
  givenname: Eloy
  surname: Anguiano
  fullname: Anguiano, Eloy
  email: eloy.anguiano@uam.es
  organization: Escuela Politécnica Superior, Universidad Autónoma de Madrid, Spain
BookMark eNp9j01LAzEURYNUsK3-AxfdS8aXzGQy3QharAoFNwruQj5eMLUzkWRG8d87ZVy7upt7D_csyKyLHRJyyaBgwOrrfeGHfkhYcOBQAC-glCdkzhrJqWRMzMh8rEkqy_XbGVnkvAcAJks2J1d3h2g_7LsOHTU6o1tlbAPVQx-72MYhr5Lucmy_dcJzcur1IePFXy7J6_b-ZfNId88PT5vbHbUl1D1lpuTCS6FZ5WpXSbEWzkvHpRCNFZW2jXCSe2O0q61HY6W1axCm5g0aKaBckmri2hRzTujVZwqtTj-KgToKq72ahNVRWAFXo_A4u5lmOH77CphUtgE7iy4ktL1yMfwP-AUCm2Nm
CitedBy_id crossref_primary_10_1016_j_cie_2023_109501
crossref_primary_10_1007_s10207_023_00700_3
crossref_primary_10_1109_ACCESS_2020_3034816
crossref_primary_10_1142_S0219691321500223
crossref_primary_10_1016_j_cose_2021_102490
crossref_primary_10_1016_j_procs_2024_06_098
crossref_primary_10_3390_math12010107
crossref_primary_10_1109_ACCESS_2022_3181278
crossref_primary_10_1109_ACCESS_2022_3218779
crossref_primary_10_1007_s11277_024_11115_1
Cites_doi 10.2139/ssrn.2937641
10.1002/isaf.1424
10.1145/844340.844345
10.1016/S1353-4858(16)30086-1
10.1109/MITP.2017.3680961
10.1007/s12599-017-0499-8
10.1016/j.comnet.2011.08.005
10.1007/s10916-018-1007-5
10.4018/IJEGR.2018010103
ContentType Journal Article
Copyright 2020
Copyright_xml – notice: 2020
DBID AAYXX
CITATION
DOI 10.1016/j.future.2020.02.037
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-7115
EndPage 603
ExternalDocumentID 10_1016_j_future_2020_02_037
S0167739X19317406
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29H
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
UHS
WUQ
XPP
ZMT
~G-
AAXKI
AAYXX
AFJKZ
CITATION
ID FETCH-LOGICAL-c306t-1b325f75a14d6d47595df7d27558c54ac85d72fbbad6cfebc7cc905b628eb7503
IEDL.DBID AIKHN
ISSN 0167-739X
IngestDate Thu Sep 26 19:54:38 EDT 2024
Fri Feb 23 02:49:45 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Ransomware
Blockchain
Smart-contracts
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c306t-1b325f75a14d6d47595df7d27558c54ac85d72fbbad6cfebc7cc905b628eb7503
PageCount 15
ParticipantIDs crossref_primary_10_1016_j_future_2020_02_037
elsevier_sciencedirect_doi_10_1016_j_future_2020_02_037
PublicationCentury 2000
PublicationDate November 2020
2020-11-00
PublicationDateYYYYMMDD 2020-11-01
PublicationDate_xml – month: 11
  year: 2020
  text: November 2020
PublicationDecade 2020
PublicationTitle Future generation computer systems
PublicationYear 2020
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Khalil, Zamyatin, Felley, Moreno-Sanchez, Gervais (b10) 2018
S. Bowe, Pay-to-sudoku, URL
Pilkington (b2) 2016
Brewer (b17) 2016; 2016
Shinde, der Veeken, Schooten, van den Berg (b24) 2016
Kumaresan, Bentov (b31) 2014
S. Bowe, Demostranting zero-knowledge contingent payments, URL
Marino, Juels (b49) 2016
Gilad, Hemo, Micali, Vlachos, Zeldovich (b47) 2017
Joseph Poon (b48) 2017
Cryptocompare, URL
Etherscan, URL
Kshetri, Voas (b25) 2017; 19
Juels, Kosba, Shi (b4) 2016; 2016
[cited 24.10.2017].
Notheisen, Cholewa, Shanmugam (b8) 2017; 59
Mercaldo, Nardone, Santone, Visaggio (b23) 2016
Khan, Arshad, Khan (b11) 2018; 14
Atzei, Bartoletti, Cimoli (b50) 2017
Hanifatunnisa, Rahardjo (b12) 2017
Dannen (b3) 2017
Fuchsbauer (b43) 2017
G. Maxwell, The first successful zero-knowledge contingent payment, URL
Kim, Laskowski (b14) 2018; 25
Kaur, Alam, Jameel, Mourya, Chang (b15) 2018; 42
V. Buterin, Ethereum white paper: A next generation smart contract & decentralized application platform, URL
Kalita (b18) 2017
Pagnia, Gärtner (b39) 1999
Christin (b34) 2013
Young, Yung (b16) 1996
Conti, Gangwal, Ruj (b21) 2018
Ali, Clarke, Mccorry (b35) 2015
Kumaresan, Moran, Bentov (b30) 2015
Franzoni, Cárdenas, Almazan (b6) 2019
Eyal, Gencer, Sirer, Renesse (b5) 2016
Hernandez-Castro, Cartwright, Stepanova (b20) 2017
Küpçü, Lysyanskaya (b36) 2012; 56
Cheng, Lee, Chi, Chen (b7) 2018
Bentov, Kumaresan (b29) 2014
Liao, Zhao, Doupe, Ahn (b26) 2016
Yuan, Wang (b9) 2016
Tse, Zhang, Yang, Cheng, Mu (b13) 2017
J. Berr, ‘WannaCry’ ransomware attack losses could reach $4 billion, URL
Jakobsson, Juels (b28) 1999
Spreitzenbarth, Freiling, Echtler, Schreck, Hoffmann (b22) 2013
[cited 07.01.2019].
Ray, Ray (b38) 2002; 3
Chaum, Fiat, Naor (b27) 1990
Nakamoto (b1) 2009
G. Wood, Ethereum: a secure decentralised generalised transaction ledger, URL
M. Prince, Empty DDoS threats: Meet the armada collective, URL
Parno, Howell, Gentry, Raykova (b44) 2013
Conti (10.1016/j.future.2020.02.037_b21) 2018
Kaur (10.1016/j.future.2020.02.037_b15) 2018; 42
Yuan (10.1016/j.future.2020.02.037_b9) 2016
Jakobsson (10.1016/j.future.2020.02.037_b28) 1999
Eyal (10.1016/j.future.2020.02.037_b5) 2016
Shinde (10.1016/j.future.2020.02.037_b24) 2016
Parno (10.1016/j.future.2020.02.037_b44) 2013
Joseph Poon (10.1016/j.future.2020.02.037_b48) 2017
Liao (10.1016/j.future.2020.02.037_b26) 2016
Fuchsbauer (10.1016/j.future.2020.02.037_b43) 2017
Tse (10.1016/j.future.2020.02.037_b13) 2017
Chaum (10.1016/j.future.2020.02.037_b27) 1990
Brewer (10.1016/j.future.2020.02.037_b17) 2016; 2016
10.1016/j.future.2020.02.037_b19
Kumaresan (10.1016/j.future.2020.02.037_b31) 2014
Atzei (10.1016/j.future.2020.02.037_b50) 2017
Pilkington (10.1016/j.future.2020.02.037_b2) 2016
Khan (10.1016/j.future.2020.02.037_b11) 2018; 14
Hanifatunnisa (10.1016/j.future.2020.02.037_b12) 2017
Khalil (10.1016/j.future.2020.02.037_b10) 2018
10.1016/j.future.2020.02.037_b42
10.1016/j.future.2020.02.037_b45
Gilad (10.1016/j.future.2020.02.037_b47) 2017
Nakamoto (10.1016/j.future.2020.02.037_b1) 2009
10.1016/j.future.2020.02.037_b46
Marino (10.1016/j.future.2020.02.037_b49) 2016
Kumaresan (10.1016/j.future.2020.02.037_b30) 2015
Franzoni (10.1016/j.future.2020.02.037_b6) 2019
Ray (10.1016/j.future.2020.02.037_b38) 2002; 3
Juels (10.1016/j.future.2020.02.037_b4) 2016; 2016
Young (10.1016/j.future.2020.02.037_b16) 1996
Notheisen (10.1016/j.future.2020.02.037_b8) 2017; 59
Mercaldo (10.1016/j.future.2020.02.037_b23) 2016
Ali (10.1016/j.future.2020.02.037_b35) 2015
Pagnia (10.1016/j.future.2020.02.037_b39) 1999
10.1016/j.future.2020.02.037_b40
Dannen (10.1016/j.future.2020.02.037_b3) 2017
10.1016/j.future.2020.02.037_b41
10.1016/j.future.2020.02.037_b32
10.1016/j.future.2020.02.037_b33
Kim (10.1016/j.future.2020.02.037_b14) 2018; 25
Hernandez-Castro (10.1016/j.future.2020.02.037_b20) 2017
Bentov (10.1016/j.future.2020.02.037_b29) 2014
10.1016/j.future.2020.02.037_b37
Kshetri (10.1016/j.future.2020.02.037_b25) 2017; 19
Christin (10.1016/j.future.2020.02.037_b34) 2013
Spreitzenbarth (10.1016/j.future.2020.02.037_b22) 2013
Küpçü (10.1016/j.future.2020.02.037_b36) 2012; 56
Cheng (10.1016/j.future.2020.02.037_b7) 2018
Kalita (10.1016/j.future.2020.02.037_b18) 2017
References_xml – start-page: 421
  year: 2014
  end-page: 439
  ident: b29
  article-title: How to use bitcoin to design fair protocols
  publication-title: Advances in Cryptology – CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2014, Proceedings, Part II
  contributor:
    fullname: Kumaresan
– start-page: 1
  year: 2017
  end-page: 6
  ident: b12
  article-title: Blockchain based e-voting recording system design
  publication-title: 2017 11th International Conference on Telecommunication Systems Services and Applications
  contributor:
    fullname: Rahardjo
– year: 2017
  ident: b3
  article-title: Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners
  contributor:
    fullname: Dannen
– start-page: 1046
  year: 2018
  end-page: 1051
  ident: b7
  article-title: Blockchain and smart contract for digital certificate
  publication-title: 2018 IEEE International Conference on Applied System Invention
  contributor:
    fullname: Chen
– year: 2017
  ident: b48
  article-title: Plasma : Scalable autonomous smart contracts
  contributor:
    fullname: Joseph Poon
– volume: 2016
  start-page: 358
  year: 2016
  ident: b4
  article-title: The ring of gyges: Investigating the future of criminal smart contracts
  publication-title: IACR Cryptol. ePrint Arch.
  contributor:
    fullname: Shi
– start-page: 2663
  year: 2016
  end-page: 2668
  ident: b9
  article-title: Towards blockchain-based intelligent transportation systems
  publication-title: 2016 IEEE 19th International Conference on Intelligent Transportation Systems
  contributor:
    fullname: Wang
– start-page: 164
  year: 2017
  end-page: 186
  ident: b50
  article-title: A survey of attacks on ethereum smart contracts SoK
  publication-title: Proceedings of the 6th International Conference on Principles of Security and Trust, Vol. 10204
  contributor:
    fullname: Cimoli
– volume: 19
  start-page: 11
  year: 2017
  end-page: 15
  ident: b25
  article-title: Do crypto-currencies fuel ransomware?
  publication-title: IT Prof.
  contributor:
    fullname: Voas
– year: 2017
  ident: b18
  article-title: WannaCry Ransomware Attack: Protect Yourself from WannaCry Ransomware Cyber Risk and Cyber War
  contributor:
    fullname: Kalita
– volume: 42
  start-page: 156
  year: 2018
  ident: b15
  article-title: A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment
  publication-title: J. Med. Syst.
  contributor:
    fullname: Chang
– start-page: 319
  year: 1990
  end-page: 327
  ident: b27
  article-title: Untraceable electronic cash
  publication-title: Advances in Cryptology — CRYPTO’ 88: Proceedings
  contributor:
    fullname: Naor
– start-page: 45
  year: 2016
  end-page: 59
  ident: b5
  article-title: Bitcoin-NG: A scalable blockchain protocol
  publication-title: 13th USENIX Symposium on Networked Systems Design and Implementation
  contributor:
    fullname: Renesse
– year: 2018
  ident: b10
  article-title: Commit-Chains: Secure, Scalable Off-Chain Payments, Cryptology ePrint Archive
  contributor:
    fullname: Gervais
– volume: 2016
  start-page: 5
  year: 2016
  end-page: 9
  ident: b17
  article-title: Ransomware attacks
  publication-title: Netw. Secur.
  contributor:
    fullname: Brewer
– start-page: 151
  year: 2016
  end-page: 166
  ident: b49
  article-title: Setting standards for altering and undoing smart contracts
  publication-title: Rule Technologies. Research, Tools, and Applications
  contributor:
    fullname: Juels
– year: 2016
  ident: b2
  article-title: Blockchain technology: principles and applications
  publication-title: Research Handbook on Digital Transformations
  contributor:
    fullname: Pilkington
– start-page: 283
  year: 2015
  end-page: 293
  ident: b35
  article-title: Bitcoin: Perils of an unregulated global P2P currency
  publication-title: Revised Selected Papers of the 23rd International Workshop on Security Protocols XXIII, Vol. 9379
  contributor:
    fullname: Mccorry
– volume: 14
  start-page: 53
  year: 2018
  end-page: 62
  ident: b11
  article-title: Secure digital voting system based on blockchain technology
  publication-title: Int. J. Electron. Gov. Res.
  contributor:
    fullname: Khan
– year: 2018
  ident: b21
  article-title: On the economic significance of ransomware campaigns: A bitcoin transactions perspective
  contributor:
    fullname: Ruj
– start-page: 195
  year: 2015
  end-page: 206
  ident: b30
  article-title: How to use bitcoin to play decentralized poker
  publication-title: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security
  contributor:
    fullname: Bentov
– start-page: 30
  year: 2014
  end-page: 41
  ident: b31
  article-title: How to use bitcoin to incentivize correct computations
  publication-title: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
  contributor:
    fullname: Bentov
– start-page: 258
  year: 1999
  end-page: 272
  ident: b28
  article-title: Proofs of work and bread pudding protocols
  publication-title: Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security
  contributor:
    fullname: Juels
– start-page: 212
  year: 2016
  end-page: 221
  ident: b23
  article-title: Ransomware steals your phone. formal methods rescue it
  publication-title: 36th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, Vol. 9688
  contributor:
    fullname: Visaggio
– start-page: 129
  year: 1996
  end-page: 140
  ident: b16
  article-title: Cryptovirology: extortion-based security threats and countermeasures
  publication-title: Proceedings 1996 IEEE Symposium on Security and Privacy
  contributor:
    fullname: Yung
– year: 2013
  ident: b44
  article-title: Pinocchio: Nearly practical verifiable computation
  publication-title: Proceedings of the IEEE Symposium on Security and Privacy
  contributor:
    fullname: Raykova
– start-page: 51
  year: 2017
  end-page: 68
  ident: b47
  article-title: Algorand: Scaling byzantine agreements for cryptocurrencies
  publication-title: Proceedings of the 26th Symposium on Operating Systems Principles
  contributor:
    fullname: Zeldovich
– year: 1999
  ident: b39
  article-title: On the Impossibility of Fair Exchange Without a Trusted Third Party
  contributor:
    fullname: Gärtner
– year: 2017
  ident: b20
  article-title: Economic analysis of ransomware
  publication-title: SSRN Electron. J.
  contributor:
    fullname: Stepanova
– volume: 56
  start-page: 50
  year: 2012
  end-page: 63
  ident: b36
  article-title: Usable optimistic fair exchange
  publication-title: Comput. Netw.
  contributor:
    fullname: Lysyanskaya
– volume: 25
  start-page: 18
  year: 2018
  end-page: 27
  ident: b14
  article-title: Toward an ontology-driven blockchain design for supply-chain provenance
  publication-title: Intell. Syst. Account. Financ. Manage.
  contributor:
    fullname: Laskowski
– year: 2017
  ident: b43
  article-title: Subversion-Zero-Knowledge SNARKs, Cryptology ePrint Archive
  contributor:
    fullname: Fuchsbauer
– start-page: 217
  year: 2019
  end-page: 218
  ident: b6
  article-title: Using blockchain to store teachers’ certification in basic education in Mexico
  publication-title: 2019 IEEE 19th International Conference on Advanced Learning Technologies, Vol. 2161-377X
  contributor:
    fullname: Almazan
– start-page: 1808
  year: 2013
  end-page: 1815
  ident: b22
  article-title: Mobile-sandbox: Having a deeper look into android applications
  publication-title: Proceedings of the 28th Annual ACM Symposium on Applied Computing
  contributor:
    fullname: Hoffmann
– start-page: 1
  year: 2016
  end-page: 13
  ident: b26
  article-title: Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
  publication-title: 2016 APWG Symposium on Electronic Crime Research
  contributor:
    fullname: Ahn
– start-page: 90
  year: 2016
  end-page: 95
  ident: b24
  article-title: Ransomware: Studying transfer and mitigation
  publication-title: 2016 International Conference on Computing, Analytics and Security Trends
  contributor:
    fullname: van den Berg
– year: 2009
  ident: b1
  article-title: Bitcoin: A peer-to-peer electronic cash system
  contributor:
    fullname: Nakamoto
– volume: 3
  start-page: 9
  year: 2002
  end-page: 17
  ident: b38
  article-title: Fair exchange in E-commerce
  publication-title: SIGecom Exch.
  contributor:
    fullname: Ray
– volume: 59
  start-page: 425
  year: 2017
  end-page: 440
  ident: b8
  article-title: Trading real-world assets on blockchain
  publication-title: Bus. Inf. Syst. Eng.
  contributor:
    fullname: Shanmugam
– start-page: 1357
  year: 2017
  end-page: 1361
  ident: b13
  article-title: Blockchain application in food supply information security
  publication-title: 2017 IEEE International Conference on Industrial Engineering and Engineering Management
  contributor:
    fullname: Mu
– start-page: 213
  year: 2013
  end-page: 224
  ident: b34
  article-title: Traveling the silk road: A measurement analysis of a large anonymous online marketplace
  publication-title: Proceedings of the 22Nd International Conference on World Wide Web
  contributor:
    fullname: Christin
– start-page: 1046
  year: 2018
  ident: 10.1016/j.future.2020.02.037_b7
  article-title: Blockchain and smart contract for digital certificate
  contributor:
    fullname: Cheng
– start-page: 421
  year: 2014
  ident: 10.1016/j.future.2020.02.037_b29
  article-title: How to use bitcoin to design fair protocols
  contributor:
    fullname: Bentov
– ident: 10.1016/j.future.2020.02.037_b46
– ident: 10.1016/j.future.2020.02.037_b42
– start-page: 319
  year: 1990
  ident: 10.1016/j.future.2020.02.037_b27
  article-title: Untraceable electronic cash
  contributor:
    fullname: Chaum
– year: 2017
  ident: 10.1016/j.future.2020.02.037_b20
  article-title: Economic analysis of ransomware
  publication-title: SSRN Electron. J.
  doi: 10.2139/ssrn.2937641
  contributor:
    fullname: Hernandez-Castro
– year: 2016
  ident: 10.1016/j.future.2020.02.037_b2
  article-title: Blockchain technology: principles and applications
  contributor:
    fullname: Pilkington
– ident: 10.1016/j.future.2020.02.037_b32
– start-page: 129
  year: 1996
  ident: 10.1016/j.future.2020.02.037_b16
  article-title: Cryptovirology: extortion-based security threats and countermeasures
  contributor:
    fullname: Young
– start-page: 283
  year: 2015
  ident: 10.1016/j.future.2020.02.037_b35
  article-title: Bitcoin: Perils of an unregulated global P2P currency
  contributor:
    fullname: Ali
– year: 2018
  ident: 10.1016/j.future.2020.02.037_b10
  contributor:
    fullname: Khalil
– start-page: 213
  year: 2013
  ident: 10.1016/j.future.2020.02.037_b34
  article-title: Traveling the silk road: A measurement analysis of a large anonymous online marketplace
  contributor:
    fullname: Christin
– start-page: 151
  year: 2016
  ident: 10.1016/j.future.2020.02.037_b49
  article-title: Setting standards for altering and undoing smart contracts
  contributor:
    fullname: Marino
– start-page: 1
  year: 2017
  ident: 10.1016/j.future.2020.02.037_b12
  article-title: Blockchain based e-voting recording system design
  contributor:
    fullname: Hanifatunnisa
– ident: 10.1016/j.future.2020.02.037_b33
– volume: 25
  start-page: 18
  issue: 1
  year: 2018
  ident: 10.1016/j.future.2020.02.037_b14
  article-title: Toward an ontology-driven blockchain design for supply-chain provenance
  publication-title: Intell. Syst. Account. Financ. Manage.
  doi: 10.1002/isaf.1424
  contributor:
    fullname: Kim
– ident: 10.1016/j.future.2020.02.037_b37
– volume: 2016
  start-page: 358
  year: 2016
  ident: 10.1016/j.future.2020.02.037_b4
  article-title: The ring of gyges: Investigating the future of criminal smart contracts
  publication-title: IACR Cryptol. ePrint Arch.
  contributor:
    fullname: Juels
– ident: 10.1016/j.future.2020.02.037_b19
– start-page: 90
  year: 2016
  ident: 10.1016/j.future.2020.02.037_b24
  article-title: Ransomware: Studying transfer and mitigation
  contributor:
    fullname: Shinde
– ident: 10.1016/j.future.2020.02.037_b40
– year: 2017
  ident: 10.1016/j.future.2020.02.037_b3
  contributor:
    fullname: Dannen
– start-page: 45
  year: 2016
  ident: 10.1016/j.future.2020.02.037_b5
  article-title: Bitcoin-NG: A scalable blockchain protocol
  contributor:
    fullname: Eyal
– start-page: 2663
  year: 2016
  ident: 10.1016/j.future.2020.02.037_b9
  article-title: Towards blockchain-based intelligent transportation systems
  contributor:
    fullname: Yuan
– year: 2013
  ident: 10.1016/j.future.2020.02.037_b44
  article-title: Pinocchio: Nearly practical verifiable computation
  contributor:
    fullname: Parno
– year: 1999
  ident: 10.1016/j.future.2020.02.037_b39
  contributor:
    fullname: Pagnia
– start-page: 1808
  year: 2013
  ident: 10.1016/j.future.2020.02.037_b22
  article-title: Mobile-sandbox: Having a deeper look into android applications
  contributor:
    fullname: Spreitzenbarth
– start-page: 195
  year: 2015
  ident: 10.1016/j.future.2020.02.037_b30
  article-title: How to use bitcoin to play decentralized poker
  contributor:
    fullname: Kumaresan
– volume: 3
  start-page: 9
  issue: 2
  year: 2002
  ident: 10.1016/j.future.2020.02.037_b38
  article-title: Fair exchange in E-commerce
  publication-title: SIGecom Exch.
  doi: 10.1145/844340.844345
  contributor:
    fullname: Ray
– volume: 2016
  start-page: 5
  issue: 9
  year: 2016
  ident: 10.1016/j.future.2020.02.037_b17
  article-title: Ransomware attacks
  publication-title: Netw. Secur.
  doi: 10.1016/S1353-4858(16)30086-1
  contributor:
    fullname: Brewer
– ident: 10.1016/j.future.2020.02.037_b45
– year: 2009
  ident: 10.1016/j.future.2020.02.037_b1
  contributor:
    fullname: Nakamoto
– year: 2018
  ident: 10.1016/j.future.2020.02.037_b21
  contributor:
    fullname: Conti
– start-page: 258
  year: 1999
  ident: 10.1016/j.future.2020.02.037_b28
  article-title: Proofs of work and bread pudding protocols
  contributor:
    fullname: Jakobsson
– year: 2017
  ident: 10.1016/j.future.2020.02.037_b18
  contributor:
    fullname: Kalita
– volume: 19
  start-page: 11
  issue: 5
  year: 2017
  ident: 10.1016/j.future.2020.02.037_b25
  article-title: Do crypto-currencies fuel ransomware?
  publication-title: IT Prof.
  doi: 10.1109/MITP.2017.3680961
  contributor:
    fullname: Kshetri
– start-page: 1
  year: 2016
  ident: 10.1016/j.future.2020.02.037_b26
  article-title: Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
  contributor:
    fullname: Liao
– start-page: 217
  year: 2019
  ident: 10.1016/j.future.2020.02.037_b6
  article-title: Using blockchain to store teachers’ certification in basic education in Mexico
  contributor:
    fullname: Franzoni
– ident: 10.1016/j.future.2020.02.037_b41
– volume: 59
  start-page: 425
  issue: 6
  year: 2017
  ident: 10.1016/j.future.2020.02.037_b8
  article-title: Trading real-world assets on blockchain
  publication-title: Bus. Inf. Syst. Eng.
  doi: 10.1007/s12599-017-0499-8
  contributor:
    fullname: Notheisen
– year: 2017
  ident: 10.1016/j.future.2020.02.037_b43
  contributor:
    fullname: Fuchsbauer
– start-page: 1357
  year: 2017
  ident: 10.1016/j.future.2020.02.037_b13
  article-title: Blockchain application in food supply information security
  contributor:
    fullname: Tse
– volume: 56
  start-page: 50
  issue: 1
  year: 2012
  ident: 10.1016/j.future.2020.02.037_b36
  article-title: Usable optimistic fair exchange
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2011.08.005
  contributor:
    fullname: Küpçü
– start-page: 30
  year: 2014
  ident: 10.1016/j.future.2020.02.037_b31
  article-title: How to use bitcoin to incentivize correct computations
  contributor:
    fullname: Kumaresan
– volume: 42
  start-page: 156
  issue: 8
  year: 2018
  ident: 10.1016/j.future.2020.02.037_b15
  article-title: A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-018-1007-5
  contributor:
    fullname: Kaur
– year: 2017
  ident: 10.1016/j.future.2020.02.037_b48
  contributor:
    fullname: Joseph Poon
– volume: 14
  start-page: 53
  issue: 1
  year: 2018
  ident: 10.1016/j.future.2020.02.037_b11
  article-title: Secure digital voting system based on blockchain technology
  publication-title: Int. J. Electron. Gov. Res.
  doi: 10.4018/IJEGR.2018010103
  contributor:
    fullname: Khan
– start-page: 212
  year: 2016
  ident: 10.1016/j.future.2020.02.037_b23
  article-title: Ransomware steals your phone. formal methods rescue it
  contributor:
    fullname: Mercaldo
– start-page: 164
  year: 2017
  ident: 10.1016/j.future.2020.02.037_b50
  article-title: A survey of attacks on ethereum smart contracts SoK
  contributor:
    fullname: Atzei
– start-page: 51
  year: 2017
  ident: 10.1016/j.future.2020.02.037_b47
  article-title: Algorand: Scaling byzantine agreements for cryptocurrencies
  contributor:
    fullname: Gilad
SSID ssj0001731
Score 2.438497
Snippet Blockchain’s benefits and advantages have been extensively studied in literature, but far fewer works can be found on the dishonest uses of them. In this...
SourceID crossref
elsevier
SourceType Aggregation Database
Publisher
StartPage 589
SubjectTerms Blockchain
Ransomware
Smart-contracts
Title Blockchain-based semi-autonomous ransomware
URI https://dx.doi.org/10.1016/j.future.2020.02.037
Volume 112
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LSsNAFL3UduPGt1gfJQt3MjZJZzLJshZLVehGC90N8wpW6YOa4s5v904yEQVx4TKBCckZcs65zH0AXOooz9I4M4RbKgla6pCkVmZEIRPqlHFFVZltMU5GE3o_ZdMGDOpaGJdW6bm_4vSSrf2drkezu5rNuo8ugZ73silaELTVru12C-WI0ia0-ncPo_EXIUfcjyVETnAL6gq6Ms2rat2BgWIcls073UD03xTqm-oM92DH28WgX73RPjTs4gB261EMgf8zD-HqBkXpVT9jnE-cMJngzc5nRG4KV7SA0X3gNGk5f5drewST4e3TYET8HASi0dAXJFK9mOWcyYiaxLgGfczk3MScsVQzKhFTw-NcKWkSnVuludZZyFQSp1a5c8pjaC6WC3sCgcwTazKqo155QmqUVWGaa8Xx0bmxpg2k_naxqtpdiDoP7EVUWAmHlQhjgVi1gdcAiR_bJpCR_1x5-u-VZ7DtrqqCwHNoFuuNvUBnUKgObF1_RB2__5_-mLnL
link.rule.ids 315,786,790,4521,24144,27955,27956,45618,45712
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwEB1V7QEu7Iiy5sANWU3cOE6OpaJKaemFVurN8ioK6qLSit_HThwEEuLANdZEzkvy5o08C8CtjEyW4kwhqmOOrKQOUap5hoRlQpkSKmJRZFuMknwSP07JtAbdqhbGpVV67i85vWBrf6Xl0WytZrPWs0ugp-1saiWIldWu7XYjJjTCdWh0-oN89EXIEfVjCS0nOIOqgq5I8ypbd9hAEYdF8043EP03D_XN6_QOYM_LxaBT7ugQanpxBPvVKIbA_5nHcHdvndKbfLFxPnKOSQXvej5DfLtxRQs2ug-cT1rOP_han8Ck9zDu5sjPQUDSCvoNikQbE0MJj2KVKNegjyhDFaaEpJLE3GKqKDZCcJVIo4WkUmYhEQlOtXDnlKdQXywX-gwCbhKtslhG7eKEVAktwtRIQe2tjdKqCah6drYq212wKg_slZVYMYcVCzGzWDWBVgCxH6-NWUb-0_L835Y3sJOPn4Zs2B8NLmDXrZTFgZdQ36y3-sqqhI249l_BJ3s0u7s
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Blockchain-based+semi-autonomous+ransomware&rft.jtitle=Future+generation+computer+systems&rft.au=Delgado-Mohatar%2C+Oscar&rft.au=Sierra-C%C3%A1mara%2C+Jos%C3%A9+Mar%C3%ADa&rft.au=Anguiano%2C+Eloy&rft.date=2020-11-01&rft.pub=Elsevier+B.V&rft.issn=0167-739X&rft.eissn=1872-7115&rft.volume=112&rft.spage=589&rft.epage=603&rft_id=info:doi/10.1016%2Fj.future.2020.02.037&rft.externalDocID=S0167739X19317406
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon