2017
DOI: 10.1007/978-3-319-66332-6_5
|View full text |Cite
|
Sign up to set email alerts
|

Redemption: Real-Time Protection Against Ransomware at End-Hosts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
119
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 98 publications
(119 citation statements)
references
References 7 publications
0
119
0
Order By: Relevance
“…Defenses are usually implemented as system services, kernel drivers (unprivileged adversary), or even user-land applications. For instance, Redemption [30] explicitly mentions that their TCB includes the display module, OS kernel, and underlying software. Redemption claims to provide real-time ransomware protection, by inspecting system-wide I/O request patterns.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Defenses are usually implemented as system services, kernel drivers (unprivileged adversary), or even user-land applications. For instance, Redemption [30] explicitly mentions that their TCB includes the display module, OS kernel, and underlying software. Redemption claims to provide real-time ransomware protection, by inspecting system-wide I/O request patterns.…”
Section: Related Workmentioning
confidence: 99%
“…Common anti-malware approaches relying on binary signatures are largely ineffective against ransomware (see e.g., [55]). Some solutions rely on system/user behavior signatures, exemplified by file system activity monitoring, e.g., [30], [55], [14], [29]. To complement detection based solutions (or assuming they may be bypassed), recovery-based mechanisms may also be deployed, e.g., Paybreak [32] stores (suspected) file encryption keys on-the-fly, right after generated but before encrypted with the ransomware's public key.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, the malicious kernel encrypts the Master File Table (MFT) section of the disk which renders the data on that disk unusable. Since NotPetya loads its own kernel, the solutions proposed by [7,13,14] is bypassed and therefore cannot protect the victim. Moreover, [15] logs the random numbers that NotPetya uses to derive the encryption keys.…”
Section: Robustnessmentioning
confidence: 99%
“…ShieldFS also monitors cryptographic primitives through searching the memory space of a suspicious process for a precomputed key schedule to increase detection speed. Lastly, Kharraz and Kirda developed Redemption [14] which monitors the same indicators as above, but redirects write calls to sparse files. By this way, malicious changes reverted more efficiently than previous defenses.…”
Section: Improvementsmentioning
confidence: 99%
“…To this end, we propose a general framework, called Redemption [54], to augment the operating system with ransomware protection capabilities. Redemption does not require performing any signicant changes in the semantics of the underlying lesystem functionality, or modifying the architecture of the operating systems.…”
Section: Overview Of the Dissertationmentioning
confidence: 99%