{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T23:10:05Z","timestamp":1752275405141,"version":"3.41.2"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Institute of Information &amp; communications Technology"},{"name":"Korea government","award":["RS-2021-II210528"],"award-info":[{"award-number":["RS-2021-II210528"]}]},{"name":"Development of Hardware-centric Trusted Computing Base and Standard Protocol for Distributed Secure Data Box","award":["RS-2021-II210532","RS-2024-00460321"],"award-info":[{"award-number":["RS-2021-II210532","RS-2024-00460321"]}]},{"name":"Development of Digital Asset Transaction Tracking Technology"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tdsc.2025.3541728","type":"journal-article","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T13:53:35Z","timestamp":1739454815000},"page":"3808-3823","source":"Crossref","is-referenced-by-count":0,"title":["MultiFile View: File-View-Based Isolation in a Single-User Environment to Protect User Data Files"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1441-164X","authenticated-orcid":false,"given":"Jione","family":"Choi","sequence":"first","affiliation":[{"name":"Institute of Cyber Security and Privacy, Korea University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0733-0136","authenticated-orcid":false,"given":"Junghee","family":"Lee","sequence":"additional","affiliation":[{"name":"Institute of Cyber Security and Privacy, Korea University, Seoul, South Korea"}]},{"given":"Gyuho","family":"Lee","sequence":"additional","affiliation":[{"name":"LIG NEX1, Seongnam, South Korea"}]},{"given":"Jaegwan","family":"Yu","sequence":"additional","affiliation":[{"name":"LIG NEX1, Seongnam, South Korea"}]},{"given":"Aran","family":"Park","sequence":"additional","affiliation":[{"name":"LIG NEX1, Seongnam, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6389-6068","authenticated-orcid":false,"given":"Chrysostomos","family":"Nicopoulos","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Cyprus, Nicosia, Cyprus"}]}],"member":"263","reference":[{"volume-title":"Trusted Computer System Evaluation Criteria","year":"1985","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384717"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2017.014735"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690548"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344298"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30086-1"},{"article-title":"Wannacry ransomware campaign exploiting SMB vulnerability","year":"2017","author":"Cert","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/195792.195795"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.123"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034443"},{"year":"2021","key":"ref11","article-title":"Create a space for yourself in chrome"},{"issue":"086","key":"ref13","first-page":"1","article-title":"Intel SGX explained","volume":"2016","author":"Costan","year":"2016","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref14","first-page":"637","article-title":"Thoth: Comprehensive policy compliance in data retrieval systems","volume-title":"Proc. 25th USENIX Secur. Symp. (USENIX Secur. 16)","author":"Elnikety"},{"article-title":"Role-based access controls","year":"2009","author":"Ferraiolo","key":"ref15"},{"key":"ref16","article-title":"The massive \u2018Petya\u2019cyber attack has hit 64 countries so far and there\u2019s no kill switch","volume":"28","author":"Ghosh","year":"2017","journal-title":"Retrieved"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.207"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00011"},{"key":"ref19","first-page":"789","article-title":"PARTEMU: Enabling dynamic analysis of real-world trustzone software using emulation","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Harrison"},{"key":"ref20","first-page":"1399","article-title":"Data recovery from scrubbed NAND flash storage: Need for analog sanitization","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Hasan"},{"key":"ref21","first-page":"214","article-title":"Security in container-based virtualization through vTPM","volume-title":"Proc. IEEE\/ACM 9th Int. Conf. Utility Cloud Comput.","author":"Hosseinzadeh"},{"issue":"162","key":"ref22","first-page":"1","article-title":"Guide to attribute based access control (ABAC) definition and considerations (draft)","volume":"800","author":"Hu","year":"2013","journal-title":"NIST Special Publication"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC47050.2019.9064441"},{"year":"2016","key":"ref24","article-title":"Intel protected file system library"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2018.00050"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2004.1400987"},{"key":"ref27","first-page":"1","article-title":"Pesos: Policy enhanced secure object store","volume-title":"Proc. 13th EuroSys Conf.","author":"Krahn"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"issue":"5","key":"ref29","first-page":"836","article-title":"Detection and analysis cerber ransomware based on network forensics behavior","volume":"20","author":"Kurniawan","year":"2018","journal-title":"Int. J. Netw. Secur."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973700"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.14"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_63346"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00169"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/Dynamics.2016.7819037"},{"issue":"6","key":"ref35","article-title":"Analysis of ransomware on windows platform","volume":"20","author":"Mohammad","year":"2020","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2001.918969"},{"article-title":"Clop ransomware","year":"2019","author":"Mundo","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/354876.354878"},{"year":"2019","key":"ref39","article-title":"What is selinux?"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.15439\/2019F212"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286893"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0060"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911732"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECCOT.2017.8284605"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_12"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2016.7549348"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947377"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741958"},{"year":"2021","key":"ref49","article-title":"Virusshare.com - because sharing is caring"},{"year":"2021","key":"ref50","article-title":"Analyze suspicious files and urls to detect types of malware, automatically share them with the security community"},{"year":"2018","key":"ref51","article-title":"Wannacry ransomware attack"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEA50009.2020.00022"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3364209"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2008.4494090"},{"key":"ref55","first-page":"1","article-title":"Tee-aided write protection against privileged data tampering","volume-title":"Proc. 26th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Zhao"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00054"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11077775\/10887067.pdf?arnumber=10887067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T22:48:32Z","timestamp":1752274112000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10887067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":55,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3541728","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}