{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:18:34Z","timestamp":1752283114299,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Natural Science Foundation of China (NSFC)","award":["Grant 61806142"],"award-info":[{"award-number":["Grant 61806142"]}]},{"name":"the MSIT(Ministry of Science and ICT) Korea under the ITRC(Information Technology Research Center) supervised by the IITP","award":["IITP-2018-2016-0-00304"],"award-info":[{"award-number":["IITP-2018-2016-0-00304"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3278491","type":"proceedings-article","created":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T13:39:38Z","timestamp":1542116378000},"page":"2258-2260","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["A Storage-level Detection Mechanism against Crypto-Ransomware"],"prefix":"10.1145","author":[{"given":"Joon-Young","family":"Paik","sequence":"first","affiliation":[{"name":"Tianjin Polytechnic University, Tianjin, China"}]},{"given":"Joong-Hyun","family":"Choi","sequence":"additional","affiliation":[{"name":"Chungnam National University, Daejeon , South Korea"}]},{"given":"Rize","family":"Jin","sequence":"additional","affiliation":[{"name":"Tianjin Polytechnic University, Tianjin, China"}]},{"given":"Jianming","family":"Wang","sequence":"additional","affiliation":[{"name":"Tianjin Polytechnic University, Tianjin , China"}]},{"given":"Eun-Sun","family":"Cho","sequence":"additional","affiliation":[{"name":"Chungnam National University, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Vadim K. and Mantej S. R. 2014. Understanding Crypto-Ransomware. {Online}. Available: https:\/\/www.bromium.com\/sites\/default\/files\/bromium-report-ransomware.pdf.  Vadim K. and Mantej S. R. 2014. Understanding Crypto-Ransomware. {Online}. Available: https:\/\/www.bromium.com\/sites\/default\/files\/bromium-report-ransomware.pdf."},{"volume-title":"Proceedings of International Conference on Distributed Computing Systems (ICDCS).","author":"Scaife N.","key":"e_1_3_2_1_2_1","unstructured":"Scaife , N. , Carter , H. , Traynor , P. , and Butler , K . 2016. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data . In Proceedings of International Conference on Distributed Computing Systems (ICDCS). Scaife, N., Carter, H., Traynor, P., and Butler, K. 2016. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. In Proceedings of International Conference on Distributed Computing Systems (ICDCS)."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of USENIX Security Symposium.","author":"Kharaz A.","year":"2016","unstructured":"Kharaz , A. , Arshad , S. , Mulliner , C. , Robertson , W. , Kirda , E. 2016 . UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware . In Proceedings of USENIX Security Symposium. Kharaz, A., Arshad, S., Mulliner, C., Robertson, W., Kirda, E. 2016. UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. In Proceedings of USENIX Security Symposium."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"key":"e_1_3_2_1_5_1","unstructured":"The OpenSSD project {Online}. Available: www.openssd-project.org.  The OpenSSD project {Online}. Available: www.openssd-project.org."},{"key":"e_1_3_2_1_6_1","unstructured":"ViusTotal {Online}. https:\/\/www.virustotal.com.  ViusTotal {Online}. https:\/\/www.virustotal.com."},{"key":"e_1_3_2_1_7_1","unstructured":"SNIA IOTTA Repository {Online}. Available: http:\/\/iotta.snia.org.  SNIA IOTTA Repository {Online}. Available: http:\/\/iotta.snia.org."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3278491","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3278491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:47Z","timestamp":1750208267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3278491"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":7,"alternative-id":["10.1145\/3243734.3278491","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3278491","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}