Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems 2022
DOI: 10.1145/3503222.3507773
|View full text |Cite
|
Sign up to set email alerts
|

RSSD: defend against ransomware with hardware-isolated network-storage codesign and post-attack analysis

Abstract: Encryption ransomware has become a notorious malware. It encrypts user data on storage devices like solid-state drives (SSDs) and demands a ransom to restore data for users. To bypass existing defenses, ransomware would keep evolving and performing new attack models. For instance, we identify and validate three new attacks, including (1) garbage-collection (GC) attack that exploits storage capacity and keeps writing data to trigger GC and force SSDs to release the retained data; (2) timing attack that intentio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 31 publications
(35 reference statements)
0
6
0
Order By: Relevance
“…A recent work is reference [223], where a ransomware SSD (State Solid Disk) (RSSD) controller is constructed based on an assisted hardware registry. This keeps old data copies in a conservative way and performs storage requests with a small overhead.…”
Section: Data Sourcementioning
confidence: 99%
“…A recent work is reference [223], where a ransomware SSD (State Solid Disk) (RSSD) controller is constructed based on an assisted hardware registry. This keeps old data copies in a conservative way and performs storage requests with a small overhead.…”
Section: Data Sourcementioning
confidence: 99%
“…This led to a notable transition in the ransomware landscape, where recent trends have witnessed a pivot towards ransomware strategies that prioritize data exfiltration [10,11]. This new breed of ransomware, exemplified by groups like Royal and Ragnar Locker, has adopted a dual-threat approach that combines the conventional method of encryption with the additional threat of exposing stolen data [5,12].…”
Section: Ransomware Evolution and Trendsmentioning
confidence: 99%
“…The progression from crypto-ransomware to ransomware that prioritizes data exfiltration signifies a more complex and menacing threat environment [4,5,12]. Data exfiltration, which entails the unauthorized copying, transferring, or retrieving of data from a computer or server, represents a ransomware variant that is frequently carried out through network channels [11,13,14].…”
Section: Introductionmentioning
confidence: 99%
“…Performance of RSSD: Our evaluation shows that (1) RSSD can retain the stale data for a much longer time than state-of-the-art approaches, over 200 days in our evaluation (see Figure 2); (2) It has less than 1% negative impact on storage performance and minimal impact on device lifetime; (3) It performs fast data recovery after attacks; (4) It enables efficient post-attack analysis by building a trusted chain of I/O operations (see [3] for the full evaluation).…”
Section: Implementation Of Rssdmentioning
confidence: 99%