{"id":"https://openalex.org/W2982586338","doi":"https://doi.org/10.1109/ewdts.2019.8884472","title":"An Analysis of LockerGoga Ransomware","display_name":"An Analysis of LockerGoga Ransomware","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2982586338","doi":"https://doi.org/10.1109/ewdts.2019.8884472","mag":"2982586338"},"language":"en","primary_location":{"id":"doi:10.1109/ewdts.2019.8884472","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts.2019.8884472","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE East-West Design &amp; Test Symposium (EWDTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084305447","display_name":"Alexander Adamov","orcid":"https://orcid.org/0000-0002-0120-5388"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Alexander Adamov","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054314504","display_name":"Anders Carlsson","orcid":"https://orcid.org/0000-0002-9328-9143"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anders Carlsson","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5083260405","display_name":"Tomasz Surmacz","orcid":"https://orcid.org/0000-0001-9741-9032"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tomasz Surmacz","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084305447"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.6537,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.91027372,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.8669646978378296},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5979699492454529},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19434481859207153},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.17888402938842773}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.8669646978378296},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5979699492454529},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19434481859207153},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.17888402938842773}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ewdts.2019.8884472","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts.2019.8884472","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE East-West Design &amp; Test Symposium (EWDTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W112964067","https://openalex.org/W1516787676","https://openalex.org/W1552695147","https://openalex.org/W1558077212","https://openalex.org/W2060145807","https://openalex.org/W4248806346","https://openalex.org/W6630982897","https://openalex.org/W6633485244"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4253977752","https://openalex.org/W2964829536","https://openalex.org/W3202245533","https://openalex.org/W3120595989","https://openalex.org/W4232561318","https://openalex.org/W2904586340"],"abstract_inverted_index":{"This":[0],"paper":[1,159],"contains":[2],"an":[3,134,162],"analysis":[4,114,163],"of":[5,15,22,51,112,157,182],"the":[6,13,19,37,49,52,56,59,74,83,107,113,124,128,139,142,158],"LockerGoga":[7,125],"ransomware":[8,62,126,190],"that":[9,54,101,165],"was":[10,63],"used":[11,104,122],"in":[12,18,161],"range":[14],"targeted":[16],"cyberattacks":[17],"first":[20],"half":[21],"2019":[23],"against":[24],"Norsk":[25],"Hydra":[26],"-":[27,44],"a":[28,69,91,95,152,183,189],"world":[29],"top":[30],"5":[31],"aluminum":[32],"manufacturer,":[33],"as":[34,36,131,133,174],"well":[35,132],"US":[38],"chemical":[39],"enterprises":[40],"Hexion,":[41],"and":[42,98,120,177],"Momentive":[43],"those":[45],"companies":[46],"are":[47],"only":[48],"tip":[50],"iceberg":[53],"reported":[55],"attack":[57,130],"to":[58,72,93,105,116,137,186],"public.":[60],"The":[61,87,110,154],"executed":[64],"by":[65,123],"attackers":[66],"from":[67],"inside":[68],"corporate":[70],"network":[71],"encrypt":[73],"data":[75],"on":[76,168],"enterprise":[77],"servers":[78],"and,":[79],"thus,":[80],"taking":[81],"down":[82],"information":[84],"control":[85],"systems.":[86],"intruders":[88],"asked":[89],"for":[90],"ransom":[92],"release":[94],"master":[96],"key":[97],"decryption":[99],"tool":[100],"can":[102,145],"be":[103,146],"decrypt":[106],"affected":[108],"files.":[109],"purpose":[111],"is":[115,166],"find":[117,187],"out":[118,188],"tactics":[119],"techniques":[121,172],"during":[127],"cryptolocker":[129],"encryption":[135,191],"model":[136],"answer":[138],"question":[140],"if":[141],"encrypted":[143],"files":[144],"decrypted":[147],"with":[148],"or":[149],"without":[150],"paying":[151],"ransom.":[153],"scientific":[155],"novelty":[156],"lies":[160],"methodology":[164],"based":[167],"various":[169],"reverse":[170],"engineering":[171],"such":[173],"multi-process":[175],"debugging":[176],"using":[178],"open":[179],"source":[180],"code":[181],"cryptographic":[184],"library":[185],"model.":[192]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
