SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery
暂无分享,去创建一个
Sungjin Lee | Aziz Mohaisen | DaeHun Nyang | Youngdon Jung | SungHa Baek | Aziz Mohaisen | Daehun Nyang | Youngdon Jung | SungHa Baek | Sungjin Lee
[1] Chris Moore,et al. Detecting Ransomware with Honeypot Techniques , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).
[2] Hilarie Orman. Evil Offspring - Ransomware and Crypto Technology , 2016, IEEE Internet Comput..
[3] Javier González,et al. LightNVM: The Linux Open-Channel SSD Subsystem , 2017, FAST.
[4] Peng Liu,et al. FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware , 2017, CCS.
[5] Xiaodong Zhang,et al. Understanding intrinsic characteristics and system implications of flash memory based solid state drives , 2009, SIGMETRICS '09.
[6] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[7] Wojciech Mazurczyk,et al. Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall , 2016, IEEE Network.
[8] Nathanael Paul,et al. Disk-level behavioral malware detection , 2008 .
[9] Gerardo Canfora,et al. An HMM and structural entropy based detector for Android malware: An empirical study , 2016, Comput. Secur..
[10] Alessandro Barenghi,et al. ShieldFS: a self-healing, ransomware-aware filesystem , 2016, ACSAC.
[11] Engin Kirda,et al. UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) , 2016, SANER.
[12] Patrick Traynor,et al. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[13] Cath Everett,et al. Ransomware: to pay or not to pay? , 2016 .
[14] Patrick D. McDaniel,et al. Rootkit-resistant disks , 2008, CCS.
[15] Craig A. N. Soules,et al. Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior , 2003, USENIX Security Symposium.
[16] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[17] Garth A. Gibson,et al. A Case for Network-Attached Secure Disks, , 1996 .