{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:50:16Z","timestamp":1765356616541,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/ewdts.2019.8884472","type":"proceedings-article","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T06:34:05Z","timestamp":1572935645000},"page":"1-5","source":"Crossref","is-referenced-by-count":17,"title":["An Analysis of LockerGoga Ransomware"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Adamov","sequence":"first","affiliation":[]},{"given":"Anders","family":"Carlsson","sequence":"additional","affiliation":[]},{"given":"Tomasz","family":"Surmacz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Abusing Code Signing for Profit Chronicle","year":"2019","key":"ref4"},{"journal-title":"Virustotal service","year":"2019","key":"ref3"},{"key":"ref10","article-title":"Twenty Years of Attacks on the RSA Cryptosystem","author":"boneh","year":"1999","journal-title":"Stanford University"},{"journal-title":"YARA-project","year":"2019","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502676"},{"journal-title":"Crypto++ crypto library","year":"2019","key":"ref5"},{"key":"ref12","first-page":"389","article-title":"Building a Cryptovirus Using Microsoft's Cryptographic API","author":"young","year":"0","journal-title":"International Conference on Information Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-38a"},{"journal-title":"OpenSSL crypto library","year":"2019","key":"ref7"},{"journal-title":"Ransomware Forces Two Chemical Companies to Order &#x2018;Hundreds of New Computers&#x2019; Motherboard","year":"2019","author":"franceschi-bicchierai","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/BFb0053428","article-title":"Optimal asymmetric encryption","volume":"950","author":"bellare","year":"1994","journal-title":"Lecture Notes in Computer Science"},{"key":"ref1","article-title":"LockerGoga Ransomware Sends Norsk Hydro Into Manual Mode","author":"ilascu","year":"2019","journal-title":"Bleeping Computer"}],"event":{"name":"2019 IEEE East-West Design & Test Symposium (EWDTS)","start":{"date-parts":[[2019,9,13]]},"location":"Batumi, Georgia","end":{"date-parts":[[2019,9,16]]}},"container-title":["2019 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8871308\/8884369\/08884472.pdf?arnumber=8884472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T11:25:22Z","timestamp":1658143522000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8884472\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ewdts.2019.8884472","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}