{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:25:09Z","timestamp":1752283509341,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/ssci.2017.8280842","type":"proceedings-article","created":{"date-parts":[[2018,2,7]],"date-time":"2018-02-07T21:44:37Z","timestamp":1518039877000},"page":"1-8","source":"Crossref","is-referenced-by-count":20,"title":["RDS3: Ransomware defense strategy by using stealthily spare space"],"prefix":"10.1109","author":[{"given":"Kul Prasad","family":"Subedi","sequence":"first","affiliation":[]},{"given":"Daya Ram","family":"Budhathoki","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Dipankar","family":"Dasgupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Automated Dynamic Analysis of Ransomware Benefits Limitations and use for Detection","year":"2016","author":"sgandurra","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref31","article-title":"Ransomware: A cyber extortion","author":"salvi","year":"2016","journal-title":"Asian Journal of Convergence in Technology"},{"journal-title":"VirtualBox User Manual","year":"2011","author":"oracle","key":"ref30"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"ref35","first-page":"159","article-title":"Whispers in the hyper-space: High-speed covert channel attacks in the cloud","author":"wu","year":"2012","journal-title":"USENIX Security Symposium"},{"journal-title":"The rsync algorithm","year":"1996","author":"tridgell","key":"ref34"},{"journal-title":"Stealth hooking Another way to subvert the windows kernel","year":"0","key":"ref10"},{"journal-title":"University pays 16 000 to stop ransomware attack","year":"2017","key":"ref11"},{"journal-title":"vsphere and vsphere with operations management","year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"journal-title":"Xenserver - server virtualization and consolidation - citrix","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2015.7387902"},{"journal-title":"Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics","year":"2016","author":"cabaj","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600110NM"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23184"},{"journal-title":"Locky ransomware distributed via docm attachments in latest email campaigns","year":"0","author":"chong","key":"ref19"},{"key":"ref28","first-page":"2","article-title":"Docker: lightweight linux containers for consistent development and deployment","author":"merkel","year":"2014","journal-title":"Linux Journal"},{"journal-title":"Internet Security Threat Report","year":"2016","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053035"},{"journal-title":"inotify - monitoring filesystem events","year":"0","key":"ref3"},{"journal-title":"Ransomware attack hit san francisco train system","year":"2016","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.14"},{"journal-title":"Ransomware a growing enterprise threat","year":"0","key":"ref5"},{"journal-title":"Ransomware Now a billion dollar a year crime and growing","year":"2017","key":"ref8"},{"journal-title":"Ransomware attackers collect ransom from kansas hospital","year":"2017","key":"ref7"},{"year":"0","key":"ref2"},{"journal-title":"setfattr Linux man page","year":"0","key":"ref9"},{"journal-title":"fio Linux man page","year":"0","key":"ref1"},{"key":"ref20","article-title":"Cryptowall ransomware held over 600k computers hostage, encrypted 5 billion files","volume":"29","author":"constantin","year":"2014","journal-title":"IDG News Service"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2015.7095802"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"key":"ref24","first-page":"30","volume":"21","author":"jarvis","year":"0","journal-title":"Cryptolocker ransomware 2013"},{"key":"ref23","first-page":"383","article-title":"Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms","author":"hund","year":"2009","journal-title":"USENIX Security Symposium"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-20550-2_1","article-title":"Cutting the gordian knot: a look under the hood of ransomware attacks","author":"kharraz","year":"2015","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref25","first-page":"757","article-title":"Unveil: A large-scale, automated approach to detecting ransomware","author":"kharraz","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"}],"event":{"name":"2017 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2017,11,27]]},"location":"Honolulu, HI","end":{"date-parts":[[2017,12,1]]}},"container-title":["2017 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8267146\/8280782\/08280842.pdf?arnumber=8280842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T14:22:08Z","timestamp":1570717328000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8280842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/ssci.2017.8280842","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}