神戸大学附属図書館デジタルアーカイブ
入力補助
English
カテゴリ
学内刊行物
ランキング
アクセスランキング
ダウンロードランキング
https://hdl.handle.net/20.500.14094/0100491414
このアイテムのアクセス数:
118
件
(
2025-07-01
15:54 集計
)
閲覧可能ファイル
ファイル
フォーマット
サイズ
閲覧回数
説明
0100491414 (fulltext)
pdf
1.58 MB
141
メタデータ
ファイル出力
メタデータID
0100491414
アクセス権
open access
出版タイプ
Version of Record
タイトル
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions
著者
Enomoto, Shuhei ; Kuzuno, Hiroki ; Yamada, Hiroshi ; Shiraishi, Yoshiaki ; Morii, Masakatu
著者名
Enomoto, Shuhei
著者ID
A3179
研究者ID
1000030882386
ORCID
0000-0003-2686-2541
KUID
https://kuid-rm-web.ofc.kobe-u.ac.jp/search/detail.html?systemId=912f4b3c221010bd520e17560c007669
著者名
Kuzuno, Hiroki
葛野, 弘樹
クズノ, ヒロキ
所属機関名
工学研究科
著者名
Yamada, Hiroshi
著者ID
A0372
研究者ID
1000070351567
KUID
https://kuid-rm-web.ofc.kobe-u.ac.jp/search/detail.html?systemId=210a85879e6855c4520e17560c007669
著者名
Shiraishi, Yoshiaki
白石, 善明
シライシ, ヨシアキ
所属機関名
工学研究科
著者ID
A0450
研究者ID
1000000220038
KUID
https://kuid-rm-web.ofc.kobe-u.ac.jp/search/detail.html?systemId=c99ab490e69627de520e17560c007669
著者名
Morii, Masakatu
森井, 昌克
モリイ, マサカツ
所属機関名
工学研究科
言語
English (英語)
収録物名
International Journal of Information Security
巻(号)
23(5)
ページ
3393-3413
出版者
Springer Nature
刊行日
2024-10
公開日
2024-08-09
注記
Published online: 30 July 2024
抄録
Ransomware attacks pose a significant threat to information systems. Server hosts, including cloud infrastructure as a service, are prime targets for ransomware developers. To address this, security mechanisms, such as antivirus software, have proven effective. Moreover, research on ransomware detection advocates for behavior-based finding mechanisms while ransomware is in operation. In response to evolving detections, ransomware developers are now adapting an optimized design tailored for CPU architecture (CPU-optimized ransomware). This variant can rapidly encrypt files, potentially evading detection by traditional antivirus methods that rely on fixed time intervals for file scans. In ransomware detection research, numerous files can be encrypted by CPU-optimized ransomware until malicious activity is detected. This study proposes an early mitigation mechanism named CryptoSniffer, which is designed specifically to counter CPU-optimized ransomware attacks on server hosts. CryptoSniffer focuses on the misuse of CPU architecture-specific encryption instructions for swift file encryption by CPU-optimized ransomware. This can be achieved by capturing the ciphertext in user processes and thwarting file encryption by scrutinizing the content intended for writing. To demonstrate the efficacy of CryptoSniffer, the mechanism was implemented in the latest Linux kernel, and its security and performance were systematically evaluated. The experimental results demonstrate that CryptoSniffer successfully prevents real-world CPU-optimized ransomware, and the performance overhead is well-suited for practical applications.
キーワード
Cloud computing
Operating system
Ransomware prevention
Software security
カテゴリ
工学研究科
学術雑誌論文
権利
© The Author(s) 2024
This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
関連情報
DOI
https://doi.org/10.1007/s10207-024-00892-2
詳細を表示
資源タイプ
journal article
ISSN
1615-5262
OPACで所蔵を検索
CiNiiで学外所蔵を検索
eISSN
1615-5270
OPACで所蔵を検索
CiNiiで学外所蔵を検索
ホームへ戻る