Follow
Ziya Alper Genç
Ziya Alper Genç
Research Associate, University of Luxembourg
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
Examination of a New Defense Mechanism: Honeywords
ZA Genc, S Kardas, MS Kiraz
62*
No random, no ransom: a key to stop cryptographic ransomware
ZA Genç, G Lenzini, PYA Ryan
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018
492018
On deception-based protection against cryptographic ransomware
ZA Genç, G Lenzini, D Sgandurra
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
382019
Next generation cryptographic ransomware
ZA Genç, G Lenzini, PYA Ryan
Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway …, 2018
242018
“The simplest protocol for oblivious transfer” revisited
ZA Genç, V Iovino, A Rial
Information Processing Letters 161, 105975, 2020
182020
Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer
MS Kiraz, ZA Genç, S Kardas
Security and Communication Networks 8 (18), 4123-4135, 2015
182015
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware
ZA Genç, G Lenzini, PYA Ryan
Emerging Technologies for Authorization and Authentication: Second …, 2020
142020
Detecting large integer arithmetic for defense against crypto ransomware
MS Kiraz, ZA Genç, E Öztürk
Cryptology ePrint Archive, 2017
142017
Security analysis of key acquiring strategies used by cryptographic ransomware
ZA Genç, G Lenzini, PYA Ryan
Proceedings of the Central European Cybersecurity Conference 2018, 1-6, 2018
132018
The cipher, the random and the ransom: a survey on current and future ransomware
ZA Genç, G Lenzini, P Ryan
Advances in Cybersecurity 2017, 2017
122017
Analysis, detection, and prevention of cryptographic ransomware
ZA Genç
University of Luxembourg, Luxembourg, Luxembourg, 2020
72020
A security analysis, and a fix, of a code-corrupted honeywords system
ZA Genç, G Lenzini, P Ryan, I Vazquez Sandoval
Proceedings of the 4th International Conference on Information Systems …, 2018
72018
A game of" Cut and Mouse" bypassing antivirus by simulating user inputs
ZA Genç, G Lenzini, D Sgandurra
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
52019
A critical security analysis of the password-based authentication honeywords system under code-corruption attack
ZA Genç, G Lenzini, PYA Ryan, I Vazquez Sandoval
Information Systems Security and Privacy: 4th International Conference …, 2019
52019
Practical exchange for unique digital goods
O Ersoy, ZA Genç, Z Erkin, M Conti
2021 IEEE International Conference on Decentralized Applications and …, 2021
42021
Security attacks and enhancements to chaotic map-based RFID authentication protocols
S Kardaş, ZA Genç
Wireless Personal Communications 98, 1135-1154, 2018
42018
Cut-and-mouse and ghost control: Exploiting antivirus software with synthesized inputs
ZA Genç, G Lenzini, D Sgandurra
Digital Threats: Research and Practice 2 (1), 1-23, 2021
32021
Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence
ZA Genç, G Lenzini
Proceedings of the 6th International Conference on Information Systems …, 2020
32020
A game of “cut and mouse”
ZA Genç, G Lenzini, D Sgandurra
Proceedings of the 35th Annual Computer Security Applications Conference, ACM, 2019
12019
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
ZA Genç, G Lenzini, D Sgandurra
Proceedings of the Third Central European Cybersecurity Conference, 1-4, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20