2022
DOI: 10.3390/fi14040115
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware-Resilient Self-Healing XML Documents

Abstract: In recent years, various platforms have witnessed an unprecedented increase in the number of ransomware attacks targeting hospitals, governments, enterprises, and end-users. The purpose of this is to maliciously encrypt documents and files on infected machines, depriving victims of access to their data, whereupon attackers would seek some sort of a ransom in return for restoring access to the legitimate owners; hence the name. This cybersecurity threat would inherently cause substantial financial losses and ti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…The result of this effort is the creation of a decryption key for recovering files held by the ransomware without the need to obtain the attacker's RSA private key or pay a ransom to the attacker. A very recent recovery method is the novel framework proposed as an efficient technique for recovering XML documents that have been compromised by ransomware attack (Al-Dwairi et al, 2022). The approach uses the concepts of links to support the distributed storage of different versions of the same file.…”
Section: Prevention Mitigation and Recovery Strategiesmentioning
confidence: 99%
“…The result of this effort is the creation of a decryption key for recovering files held by the ransomware without the need to obtain the attacker's RSA private key or pay a ransom to the attacker. A very recent recovery method is the novel framework proposed as an efficient technique for recovering XML documents that have been compromised by ransomware attack (Al-Dwairi et al, 2022). The approach uses the concepts of links to support the distributed storage of different versions of the same file.…”
Section: Prevention Mitigation and Recovery Strategiesmentioning
confidence: 99%
“…It is then used to decrypt the files and folders encrypted by ransomware. SH-VARR is a framework developed by Al-Dwairi et al [18], which utilizes the link concept to protect any XML document from being encrypted or deleted during a ransomware attack.…”
Section: Introductionmentioning
confidence: 99%
“…Current solutions against ransomware do not cover all possible risks of data loss. In this article [ 16 ], the authors try to address this aspect and provide an effective solution that ensures efficient recovery of XML documents after ransomware attacks.…”
mentioning
confidence: 99%