{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T19:01:00Z","timestamp":1772046060007,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1947580"],"award-info":[{"award-number":["CNS-1947580"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,1,1]]},"DOI":"10.1109\/tdsc.2022.3214781","type":"journal-article","created":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T21:40:53Z","timestamp":1673646053000},"page":"1-16","source":"Crossref","is-referenced-by-count":18,"title":["Seamlessly Safeguarding Data Against Ransomware Attacks"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6199-6468","authenticated-orcid":false,"given":"Abdulrahman Abu","family":"Elkhail","sequence":"first","affiliation":[{"name":"University of Michigan, Dearborn, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4148-7367","authenticated-orcid":false,"given":"Nada","family":"Lachtar","sequence":"additional","affiliation":[{"name":"University of Michigan, Dearborn, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9011-296X","authenticated-orcid":false,"given":"Duha","family":"Ibdah","sequence":"additional","affiliation":[{"name":"University of Michigan, Dearborn, MI, USA"}]},{"given":"Rustam","family":"Aslam","sequence":"additional","affiliation":[{"name":"University of Michigan, Dearborn, MI, USA"}]},{"given":"Hamza","family":"Khan","sequence":"additional","affiliation":[{"name":"University of Michigan, Dearborn, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6711-1280","authenticated-orcid":false,"given":"Anys","family":"Bacha","sequence":"additional","affiliation":[{"name":"University of Michigan, Dearborn, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6006-3888","authenticated-orcid":false,"given":"Hafiz","family":"Malik","sequence":"additional","affiliation":[{"name":"University of Michigan, Dearborn, MI, USA"}]}],"member":"263","reference":[{"key":"ref2","article-title":"Flexible I\/O tester","author":"Axboe","year":"2016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00089"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-22r1a"},{"key":"ref6","volume-title":"Benchmarking Modern Multiprocessors","author":"Bienia","year":"2011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.10.012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787905"},{"key":"ref9","article-title":"Conti ransomware attack 2020","author":"Cimpanu","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"key":"ref11","article-title":"Global ransomware damage costs to exceed ${\\$}$$265 billion by 2031","author":"Farber","year":"2017"},{"key":"ref12","article-title":"Ransomware attacks hit manufacturing - Are you vulnerable?","author":"Greenberg","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2756908"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750420"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134035"},{"key":"ref17","article-title":"Petyas master boot record infection","author":"Hung","year":"2017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-191346"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3257-z"},{"key":"ref20","article-title":"Kaspersky, What is WannaCry ransomware?"},{"key":"ref21","first-page":"757","article-title":"{UNVEIL }: A large-scale, automated approach to detecting ransomware","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Kharaz"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270426"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046740"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053035"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LOCS.2019.2918091"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2020.3035875"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931136"},{"key":"ref31","article-title":"How the most damaging ransomware evades IT security","author":"Loman","year":"2019"},{"key":"ref32","volume-title":"Linux Kernel Development","author":"Love","year":"2010"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_6"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2018.2883431"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.14"},{"key":"ref36","article-title":"Global ransomware damage costs predicted to reach ${\\$}$$20 billion (USD) by 2021","author":"Morgan","year":"2019"},{"key":"ref37","article-title":"11 ransomware trends for 2018","author":"Nadeau","year":"2018"},{"key":"ref38","article-title":"How conti ransomware works","author":"Olenick","year":"2021"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3"},{"key":"ref40","article-title":"Poster: Self-defensible storage devices based on flash memory against ransomware","volume-title":"Proc. IEEE Symp. Secur.Privacy","author":"Paik"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.010"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2016.7482078"},{"key":"ref43","article-title":"Cuckoo sandbox: Automated malware analysis","year":"2015"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"ref45","article-title":"Automated dynamic analysis of ransomware: Benefits, limitations and use for detection","author":"Sgandurra","year":"2016"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2018.8328219"},{"key":"ref47","article-title":"Ransomware attacks hit manufacturing - Are you vulnerable?","author":"Shohet","year":"2019"},{"key":"ref48","article-title":"Colonial pipeline shells out ${\\$}$$5M in extortion payout, report","author":"Spring","year":"2021"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8280842"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3229710.3229726"},{"issue":"1","key":"ref51","first-page":"6","article-title":"Filebench: A flexible framework for file system benchmarking","volume":"41","author":"Tarasov","year":"2016","journal-title":"USENIX Login"},{"key":"ref52","article-title":"Baltimore ransomware attack will cost the city over ${\\$}$$18 million","author":"Torbet","year":"2019"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8125850"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.56"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.052"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8858\/10016903\/10017139-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10016903\/10017139.pdf?arnumber=10017139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T06:31:11Z","timestamp":1707805871000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10017139\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,1]]},"references-count":53,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3214781","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,1]]}}}