Reactive redundancy for data destruction protection (R2D2)
•We demonstrate R2D2's ability to preserve files under destruction on a Windows 7 VM.•R2D2 protects against modern Wiper Malware and secure delete methods.•R2D2 improves prior work by isolating analysis/preservation from the protected system.•R2D2 shows acceptable performance, suitable for the...
Gespeichert in:
Veröffentlicht in: | Computers & security 2018-05, Vol.74, p.184-201 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 201 |
---|---|
container_issue | |
container_start_page | 184 |
container_title | Computers & security |
container_volume | 74 |
creator | Gutierrez, Christopher N. Spafford, Eugene H. Bagchi, Saurabh Yurek, Thomas |
description | •We demonstrate R2D2's ability to preserve files under destruction on a Windows 7 VM.•R2D2 protects against modern Wiper Malware and secure delete methods.•R2D2 improves prior work by isolating analysis/preservation from the protected system.•R2D2 shows acceptable performance, suitable for the home user or office related tasks.
Data destruction programs, such as Wiper Malware, cause substantial damage by overwriting critical digital assets on compromised machines, denying users access to computing resources. Our system, called R2D2, analyzes write buffers before they can reach a storage medium, determines if the write is destructive, and preserves the data under destruction. We interpose the inspection in the Virtual Machine Monitor (VMM) through a technique known as Virtual Machine Introspection (VMI). This has the benefit that it does not rely on the entire OS as a root of trust. We demonstrate the effectiveness of our prototype implementation by preserving data targeted for destruction by Wiper Malware such as Shamoon and Stonedrill, and a host of secure delete tools. We discover that R2D2 detects data destruction with high accuracy (99.8% true negative and true positive rates) and preserves critical data for all the Wiper Malware samples in the wild that we experimented with. While our prototype is not optimized for performance, we show that it is applicable for common user tasks in an office or home setting, with a latency increase of 1%–4% and 9%–20% to complete batch tasks and interactive tasks respectively. VMI accounts for 90.7%–98.5% of the latency overhead and thus R2D2 incurs a small cost for environments already using VMI. |
doi_str_mv | 10.1016/j.cose.2017.12.012 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2068015705</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S016740481730281X</els_id><sourcerecordid>2068015705</sourcerecordid><originalsourceid>FETCH-LOGICAL-c372t-d28934998dd6cce6f2102a6da74d662d7f4df35d316d97b62524c9c4719ddc213</originalsourceid><addsrcrecordid>eNp9kE9LxDAQxYMouK5-AU8FL3pozUzbJBUv4n9YEBY9h5hJoUWbNWkX9tubpZ49zcD83sybx9g58AI4iOu-sD66AjnIArDggAdsAUpiLpCrQ7ZIkMwrXqljdhJjzxMolFqwm7Uzduy2LguOpoHMYHdZ60NGZjQZuTiGKc39kG2CH93cXq7xAa9O2VFrvqI7-6tL9vH0-H7_kq_enl_v71a5LSWOOaFqyqppFJGw1okWgaMRZGRFQiDJtqK2rKkEQY38FFhjZRtbSWiILEK5ZBfz3uTgZ0qOdO-nMKSTGrlQHGrJ60ThTNngYwyu1ZvQfZuw08D1PiPd631Gep-RBtQpoyS6nUUu-d92LuhoOzdYR11Iv2ry3X_yX4-3bjQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2068015705</pqid></control><display><type>article</type><title>Reactive redundancy for data destruction protection (R2D2)</title><source>Access via ScienceDirect (Elsevier)</source><creator>Gutierrez, Christopher N. ; Spafford, Eugene H. ; Bagchi, Saurabh ; Yurek, Thomas</creator><creatorcontrib>Gutierrez, Christopher N. ; Spafford, Eugene H. ; Bagchi, Saurabh ; Yurek, Thomas</creatorcontrib><description>•We demonstrate R2D2's ability to preserve files under destruction on a Windows 7 VM.•R2D2 protects against modern Wiper Malware and secure delete methods.•R2D2 improves prior work by isolating analysis/preservation from the protected system.•R2D2 shows acceptable performance, suitable for the home user or office related tasks.
Data destruction programs, such as Wiper Malware, cause substantial damage by overwriting critical digital assets on compromised machines, denying users access to computing resources. Our system, called R2D2, analyzes write buffers before they can reach a storage medium, determines if the write is destructive, and preserves the data under destruction. We interpose the inspection in the Virtual Machine Monitor (VMM) through a technique known as Virtual Machine Introspection (VMI). This has the benefit that it does not rely on the entire OS as a root of trust. We demonstrate the effectiveness of our prototype implementation by preserving data targeted for destruction by Wiper Malware such as Shamoon and Stonedrill, and a host of secure delete tools. We discover that R2D2 detects data destruction with high accuracy (99.8% true negative and true positive rates) and preserves critical data for all the Wiper Malware samples in the wild that we experimented with. While our prototype is not optimized for performance, we show that it is applicable for common user tasks in an office or home setting, with a latency increase of 1%–4% and 9%–20% to complete batch tasks and interactive tasks respectively. VMI accounts for 90.7%–98.5% of the latency overhead and thus R2D2 incurs a small cost for environments already using VMI.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2017.12.012</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Computer security ; Computer viruses ; Data availability ; Data integrity ; Data resiliency ; Inspection ; Malware ; Network security ; Operating systems security ; Redundancy ; Studies ; Virtual Machine Introspection ; Virtualization</subject><ispartof>Computers & security, 2018-05, Vol.74, p.184-201</ispartof><rights>2018 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. May 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c372t-d28934998dd6cce6f2102a6da74d662d7f4df35d316d97b62524c9c4719ddc213</citedby><cites>FETCH-LOGICAL-c372t-d28934998dd6cce6f2102a6da74d662d7f4df35d316d97b62524c9c4719ddc213</cites><orcidid>0000-0002-5037-4591 ; 0000-0002-5555-8330</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.cose.2017.12.012$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Gutierrez, Christopher N.</creatorcontrib><creatorcontrib>Spafford, Eugene H.</creatorcontrib><creatorcontrib>Bagchi, Saurabh</creatorcontrib><creatorcontrib>Yurek, Thomas</creatorcontrib><title>Reactive redundancy for data destruction protection (R2D2)</title><title>Computers & security</title><description>•We demonstrate R2D2's ability to preserve files under destruction on a Windows 7 VM.•R2D2 protects against modern Wiper Malware and secure delete methods.•R2D2 improves prior work by isolating analysis/preservation from the protected system.•R2D2 shows acceptable performance, suitable for the home user or office related tasks.
Data destruction programs, such as Wiper Malware, cause substantial damage by overwriting critical digital assets on compromised machines, denying users access to computing resources. Our system, called R2D2, analyzes write buffers before they can reach a storage medium, determines if the write is destructive, and preserves the data under destruction. We interpose the inspection in the Virtual Machine Monitor (VMM) through a technique known as Virtual Machine Introspection (VMI). This has the benefit that it does not rely on the entire OS as a root of trust. We demonstrate the effectiveness of our prototype implementation by preserving data targeted for destruction by Wiper Malware such as Shamoon and Stonedrill, and a host of secure delete tools. We discover that R2D2 detects data destruction with high accuracy (99.8% true negative and true positive rates) and preserves critical data for all the Wiper Malware samples in the wild that we experimented with. While our prototype is not optimized for performance, we show that it is applicable for common user tasks in an office or home setting, with a latency increase of 1%–4% and 9%–20% to complete batch tasks and interactive tasks respectively. VMI accounts for 90.7%–98.5% of the latency overhead and thus R2D2 incurs a small cost for environments already using VMI.</description><subject>Computer security</subject><subject>Computer viruses</subject><subject>Data availability</subject><subject>Data integrity</subject><subject>Data resiliency</subject><subject>Inspection</subject><subject>Malware</subject><subject>Network security</subject><subject>Operating systems security</subject><subject>Redundancy</subject><subject>Studies</subject><subject>Virtual Machine Introspection</subject><subject>Virtualization</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp9kE9LxDAQxYMouK5-AU8FL3pozUzbJBUv4n9YEBY9h5hJoUWbNWkX9tubpZ49zcD83sybx9g58AI4iOu-sD66AjnIArDggAdsAUpiLpCrQ7ZIkMwrXqljdhJjzxMolFqwm7Uzduy2LguOpoHMYHdZ60NGZjQZuTiGKc39kG2CH93cXq7xAa9O2VFrvqI7-6tL9vH0-H7_kq_enl_v71a5LSWOOaFqyqppFJGw1okWgaMRZGRFQiDJtqK2rKkEQY38FFhjZRtbSWiILEK5ZBfz3uTgZ0qOdO-nMKSTGrlQHGrJ60ThTNngYwyu1ZvQfZuw08D1PiPd631Gep-RBtQpoyS6nUUu-d92LuhoOzdYR11Iv2ry3X_yX4-3bjQ</recordid><startdate>201805</startdate><enddate>201805</enddate><creator>Gutierrez, Christopher N.</creator><creator>Spafford, Eugene H.</creator><creator>Bagchi, Saurabh</creator><creator>Yurek, Thomas</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-5037-4591</orcidid><orcidid>https://orcid.org/0000-0002-5555-8330</orcidid></search><sort><creationdate>201805</creationdate><title>Reactive redundancy for data destruction protection (R2D2)</title><author>Gutierrez, Christopher N. ; Spafford, Eugene H. ; Bagchi, Saurabh ; Yurek, Thomas</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c372t-d28934998dd6cce6f2102a6da74d662d7f4df35d316d97b62524c9c4719ddc213</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer security</topic><topic>Computer viruses</topic><topic>Data availability</topic><topic>Data integrity</topic><topic>Data resiliency</topic><topic>Inspection</topic><topic>Malware</topic><topic>Network security</topic><topic>Operating systems security</topic><topic>Redundancy</topic><topic>Studies</topic><topic>Virtual Machine Introspection</topic><topic>Virtualization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gutierrez, Christopher N.</creatorcontrib><creatorcontrib>Spafford, Eugene H.</creatorcontrib><creatorcontrib>Bagchi, Saurabh</creatorcontrib><creatorcontrib>Yurek, Thomas</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gutierrez, Christopher N.</au><au>Spafford, Eugene H.</au><au>Bagchi, Saurabh</au><au>Yurek, Thomas</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Reactive redundancy for data destruction protection (R2D2)</atitle><jtitle>Computers & security</jtitle><date>2018-05</date><risdate>2018</risdate><volume>74</volume><spage>184</spage><epage>201</epage><pages>184-201</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>•We demonstrate R2D2's ability to preserve files under destruction on a Windows 7 VM.•R2D2 protects against modern Wiper Malware and secure delete methods.•R2D2 improves prior work by isolating analysis/preservation from the protected system.•R2D2 shows acceptable performance, suitable for the home user or office related tasks.
Data destruction programs, such as Wiper Malware, cause substantial damage by overwriting critical digital assets on compromised machines, denying users access to computing resources. Our system, called R2D2, analyzes write buffers before they can reach a storage medium, determines if the write is destructive, and preserves the data under destruction. We interpose the inspection in the Virtual Machine Monitor (VMM) through a technique known as Virtual Machine Introspection (VMI). This has the benefit that it does not rely on the entire OS as a root of trust. We demonstrate the effectiveness of our prototype implementation by preserving data targeted for destruction by Wiper Malware such as Shamoon and Stonedrill, and a host of secure delete tools. We discover that R2D2 detects data destruction with high accuracy (99.8% true negative and true positive rates) and preserves critical data for all the Wiper Malware samples in the wild that we experimented with. While our prototype is not optimized for performance, we show that it is applicable for common user tasks in an office or home setting, with a latency increase of 1%–4% and 9%–20% to complete batch tasks and interactive tasks respectively. VMI accounts for 90.7%–98.5% of the latency overhead and thus R2D2 incurs a small cost for environments already using VMI.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2017.12.012</doi><tpages>18</tpages><orcidid>https://orcid.org/0000-0002-5037-4591</orcidid><orcidid>https://orcid.org/0000-0002-5555-8330</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 2018-05, Vol.74, p.184-201 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_proquest_journals_2068015705 |
source | Access via ScienceDirect (Elsevier) |
subjects | Computer security Computer viruses Data availability Data integrity Data resiliency Inspection Malware Network security Operating systems security Redundancy Studies Virtual Machine Introspection Virtualization |
title | Reactive redundancy for data destruction protection (R2D2) |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T21%3A51%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Reactive%20redundancy%20for%20data%20destruction%20protection%20(R2D2)&rft.jtitle=Computers%20&%20security&rft.au=Gutierrez,%20Christopher%20N.&rft.date=2018-05&rft.volume=74&rft.spage=184&rft.epage=201&rft.pages=184-201&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2017.12.012&rft_dat=%3Cproquest_cross%3E2068015705%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2068015705&rft_id=info:pmid/&rft_els_id=S016740481730281X&rfr_iscdi=true |