{"id":"https://openalex.org/W4296438248","doi":"https://doi.org/10.1109/access.2022.3207757","title":"An Analysis of Conti Ransomware Leaked Source Codes","display_name":"An Analysis of Conti Ransomware Leaked Source Codes","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4296438248","doi":"https://doi.org/10.1109/access.2022.3207757"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3207757","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3207757","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09895237.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09895237.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101498344","display_name":"Saleh Alzahrani","orcid":"https://orcid.org/0000-0001-8380-2487"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saleh Alzahrani","raw_affiliation_strings":["Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"],"raw_orcid":"https://orcid.org/0000-0001-8380-2487","affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA","institution_ids":["https://openalex.org/I17301866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046618429","display_name":"Yang Xiao","orcid":"https://orcid.org/0000-0001-8549-6794"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yang Xiao","raw_affiliation_strings":["Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"],"raw_orcid":"https://orcid.org/0000-0001-8549-6794","affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA","institution_ids":["https://openalex.org/I17301866"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083675785","display_name":"Wei Sun","orcid":"https://orcid.org/0000-0003-4075-0597"},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Sun","raw_affiliation_strings":["School of Electrical Engineering and Automation, Hefei University of Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0003-4075-0597","affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Automation, Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I16365422"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101498344"],"corresponding_institution_ids":["https://openalex.org/I17301866"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":7.4394,"has_fulltext":true,"cited_by_count":53,"citation_normalized_percentile":{"value":0.98106124,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"10","issue":null,"first_page":"100178","last_page":"100193"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9527798891067505},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7611184120178223},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6098924875259399},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6009517908096313},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5766914486885071},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4446914792060852},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.41444259881973267},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3503117561340332},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.2281445562839508}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9527798891067505},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7611184120178223},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6098924875259399},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6009517908096313},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5766914486885071},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4446914792060852},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.41444259881973267},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3503117561340332},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2281445562839508},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3207757","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3207757","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09895237.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a1f9eedb587e4e7c85a488c87c61a7e7","is_oa":true,"landing_page_url":"https://doaj.org/article/a1f9eedb587e4e7c85a488c87c61a7e7","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 100178-100193 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3207757","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3207757","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09895237.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.800000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320311702","display_name":"St Mary's University","ror":"https://ror.org/0067fqk38"},{"id":"https://openalex.org/F4320312852","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67"},{"id":"https://openalex.org/F4320322300","display_name":"Jilin University","ror":"https://ror.org/00js3aw79"},{"id":"https://openalex.org/F4320324433","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30"},{"id":"https://openalex.org/F4320326536","display_name":"Hefei University","ror":"https://ror.org/01f5rdf64"},{"id":"https://openalex.org/F4320328099","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4296438248.pdf","grobid_xml":"https://content.openalex.org/works/W4296438248.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W1529311848","https://openalex.org/W1573946010","https://openalex.org/W1966396391","https://openalex.org/W1982582614","https://openalex.org/W2037374011","https://openalex.org/W2056690037","https://openalex.org/W2066562613","https://openalex.org/W2106068378","https://openalex.org/W2154871153","https://openalex.org/W2167934211","https://openalex.org/W2513529237","https://openalex.org/W2546863431","https://openalex.org/W2552218842","https://openalex.org/W2756723748","https://openalex.org/W2963419590","https://openalex.org/W2983541680","https://openalex.org/W3000953536","https://openalex.org/W3115397429","https://openalex.org/W3169092194","https://openalex.org/W3173443078","https://openalex.org/W3175479041","https://openalex.org/W3193692833","https://openalex.org/W3197120839","https://openalex.org/W3211746486","https://openalex.org/W4200017670","https://openalex.org/W4206830000","https://openalex.org/W4214919535","https://openalex.org/W4220893462","https://openalex.org/W4247359328","https://openalex.org/W4285070607","https://openalex.org/W4285070830"],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4253977752","https://openalex.org/W2964829536","https://openalex.org/W3120595989","https://openalex.org/W4232561318","https://openalex.org/W2904586340","https://openalex.org/W2942879794","https://openalex.org/W3202245533"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"there":[3],"has":[4],"been":[5],"an":[6,71,97,146],"increase":[7],"in":[8,30,67,145],"ransomware":[9,28,57,60,88],"attacks":[10,13],"worldwide.":[11],"These":[12,25],"aim":[14],"to":[15,44,153],"lock":[16],"victims\u2019":[17],"machines":[18],"or":[19],"encrypt":[20],"their":[21,31,46],"files":[22],"for":[23],"ransom.":[24],"kinds":[26],"of":[27,139],"differ":[29],"implementation":[32],"and":[33,53,69,79,126,136,149],"techniques,":[34,120],"starting":[35,113],"from":[36,48],"how":[37],"they":[38,41],"spread,":[39],"vulnerabilities":[40],"leverage,":[42],"methods":[43],"hide":[45],"behaviors":[47],"antivirus":[49],"software,":[50],"encryption":[51],"methods,":[52],"performance.":[54],"The":[55],"Conti":[56,87,143],"is":[58],"sophisticated":[59],"that":[61],"operates":[62],"as":[63],"ransomware-as-a-service.":[64],"It":[65],"started":[66],"2019":[68],"had":[70],"unprecedented":[72],"human":[73],"impact":[74],"by":[75,96],"targeting":[76],"healthcare":[77],"systems":[78],"cost":[80],"$45":[81],"million.":[82],"This":[83],"paper":[84],"analyzes":[85],"the":[86,104,140],"source":[89,155],"codes":[90],"leaked":[91],"on":[92],"February":[93],"27,":[94],"2022,":[95],"anonymous":[98],"individual.":[99],"We":[100,131],"first":[101],"look":[102],"at":[103],"general":[105],"code":[106,156],"structure.":[107],"Then,":[108],"we":[109],"analyze":[110],"its":[111,115,128,151,154],"flow,":[112],"with":[114],"application":[116],"programming":[117],"interface":[118],"disguise":[119],"anti":[121],"hook":[122],"mechanisms,":[123],"command-line":[124],"arguments,":[125],"finally,":[127],"multithreaded":[129],"encryption.":[130],"also":[132],"perform":[133],"a":[134],"static":[135],"dynamic":[137],"analysis":[138],"latest":[141],"known":[142],"sample":[144],"isolated":[147],"environment":[148],"compare":[150],"behavior":[152],"flows.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
