ABSTRACT
Ransomware is increasingly prevalent in recent years. To defend against ransomware in computing devices using flash memory as external storage, existing designs extract the entire raw flash memory data to restore the external storage to a good state. However, they cannot allow a fine-grained recovery in terms of user files as raw flash memory data do not have the semantics of "files''.
In this work, we design FFRecovery, a new ransomware defense strategy that can support fine-grained data recovery after the attacks. Our key idea is, to recover a file corrupted by the ransomware, we can 1) restore its file system metadata via file system forensics, and 2) extract its file data via raw data extraction from the flash translation layer, and 3) assemble the corresponding file system metadata and the file data. A simple prototype of FFRecovery has been developed and some preliminary results are provided.
- ext4 data structures and algorithms. https://docs.kernel.org/filesystems/ext4/ globals.html.Google Scholar
- Lpc-h3131. https://www.olimex.com/Products/ARM/NXP/LPC-H3131/.Google Scholar
- Ssd market share. https://www.t4.ai/industry/ssd-market-share.Google Scholar
- Sung Ha Baek, Youngdon Jung, Aziz Mohaisen, Sungjin Lee, and DaeHun Nyang. Ssd-insider: Internal defense of solid-state drive against ransomware with perfect data recovery. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pages 875--884. IEEE, 2018.Google Scholar
Cross Ref
- Niusen Chen and Bo Chen. Defending against os-level malware in mobile devices via real-time malware detection and storage restoration. Journal of Cybersecurity and Privacy, 2(2):311--328, 2022.Google Scholar
Cross Ref
- Google Code. Opennfm. https://code.google.com/p/opennfm/.Google Scholar
- Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, and Luning Xia. Supporting transparent snapshot for bare-metal malware analysis on mobile devices. In Proceedings of the 33rd Annual Computer Security Applications Conference, pages 339--349, 2017.Google Scholar
Digital Library
- Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, and Moinuddin K Qureshi. Flashguard: Leveraging intrinsic flash properties to defend against encryption ransomware. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 2231--2244. ACM, 2017.Google Scholar
Digital Library
- Donghyun Min, Donggyu Park, Jinwoo Ahn, Ryan Walker, Junghee Lee, Sungyong Park, and Youngjae Kim. Amoeba: an autonomous backup and recovery ssd for ransomware attack defense. IEEE Computer Architecture Letters, 17(2):245--248, 2018.Google Scholar
Digital Library
- Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, and Peng Liu. Mimosaftl: adding secure and practical ransomware defense strategy to flash translation layer. In Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, pages 327--338, 2019.Google Scholar
Digital Library
- Xiaohao Wang, Yifan Yuan, You Zhou, Chance C Coats, and Jian Huang. Project almanac: A time-traveling solid-state drive. In Proceedings of the Fourteenth EuroSys Conference 2019, pages 1--16, 2019.Google Scholar
- Wen Xie, Niusen Chen, and Bo Chen. Enabling accurate data recovery for mobile devices against malware attacks. In 18th EAI International Conference on Security and Privacy in Communication Networks, 2022.Google Scholar
Index Terms
Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction
Recommendations
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware
Encryption ransomware is a malicious software that stealthily encrypts user files and demands a ransom to provide access to these files. Several prior studies have developed systems to detect ransomware by monitoring the activities that typically occur ...
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer
Ransomware attacks have become prevalent nowadays due to sudden flourish of cryptocurrencies. Most existing defense strategies for ransomware, however, are vulnerable to privileged ransomware who can compromise the operating system and hence any backup ...
POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality
A filesystem capable of curtailing data theft and ensuring file integrity protection through deception is introduced and evaluated. The deceptive filesystem transparently creates multiple levels of stacking to protect the base filesystem and monitor ...






Comments