Presenting a systematic study of various Windows API calls made by ransomware.
Investigating key extraction via memory forensics against ransomware.
Latest trends in modern malware
A tale of ransomware, key management, and the CryptoAPI
Hipster ransomware do more than mere encryption
The six categories of ransomware virulence