Fig. 1. Structure diagram for disk access[8]
Fig. 2. Structure diagram for disk access
Fig. 3. Delayed deletion behavior of SSD
Fig. 4. Data recovery method with garbage collection delay
Table 1. Statistics on PC environment and company size
Table 2. Security empirical statistics of the sample
References
- N. Scaife, H. Carter, P. Traynor, and K. Butler, "Cryptolock(and drop it): Stopping ransomware attacks on user data", Proceedings of IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp.303-312, June 2016. DOI: https://doi.org/10.1109/ICDCS.2016.46
- Joon-young Paik, Keun-tae Shin, Eun-sun Cho, "Self-Defensible Storage Devices based on Flash memory against Ransomware", IEEE Symposium on Security and Privacy, May 2016.
- C. Everette, "Ransomware: to pay or not to pay?" Journal of Computer Fraud & Security, Vol.16, No.4, pp.8-12, April 2016. DOI: https://doi.org/10.1016/S1361-3723(16)30036-7
- Y Qin, W Tong, J Liu, Z Zhu, "SmSD: A smart secure deletion scheme for SSDs", Journal of Convergence, Vol.4, No.4, pp.8-12, Dec. 2013.
- N. Hampton, Z. Baig, S. Zeadally, "Ransomware behavioural analysis on windows platforms", Journal of Information Security and Applications, Vol.40, pp.44-51, June 2018. DOI: http://dx.doi.org/10.1016/j.jisa.2018.02.008
- J. S. Aidan, H. K. Verma, L. K. Awasthi, "Comprehensive Survey on Petya Ransomware Attack", Proceedings of International Conference on Next Generation Computing and Information Systems (ICNGCIS), pp.11-12, Dec. 2017. DOI: https://doi.org/10.1109/ICNGCIS.2017.30
- F. Chen, D. A. Koufaty, X. Zhang, "Understanding intrinsic characteristics and system implications of flash memory based solid state drives", Proceedings of the International Joint Conference on Measurement and Modeling of Computer Systems, pp.181-192, June 2009. DOI: https://doi.org/10.1145/1555349.1555371
- Yu-Ji Lee, Internet Nayana, Ransomware infection by APT attack, security management, Byline Network, 2017. Available From: https://byline.network/2017/06/1-792/ (accessed Dec. 20, 2018)
- C. Moore, "Detecting Ransomware with Honeypot Techniques", Proceedings of Cybersecurity and Cyberforensics Conference(CCC), pp.2-4, Aug. 2016. DOI: https://doi.org/10.1109/CCC.2016.14
- H. Orman, "Evil offspring - Ransomware and crypto technology," Journal of IEEE Internet Computing, Vol.20, No.5, pp.89-94, Oct. 2016. DOI: https://doi.org/10.1109/MIC.2016.90
- E. Kirda, "UNVEIL: A large-scale, automated approach to detecting ransomware," Proceedings of tIEEE 24th International Conference on Software Analysis, Evolution and Reengineering(SANER), pp.20-24 Feb. 2017. DOI: https://doi.org/10.1109/SANER.2017.7884603