{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:50Z","timestamp":1750220210465,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T00:00:00Z","timestamp":1656288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2021R1H1A2093240"],"award-info":[{"award-number":["NRF-2021R1H1A2093240"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018058","name":"SK Hynix","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018058","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,27]]},"DOI":"10.1145\/3538643.3539749","type":"proceedings-article","created":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T22:31:06Z","timestamp":1656023466000},"page":"113-118","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Alohomora"],"prefix":"10.1145","author":[{"given":"Sanggu","family":"Lee","sequence":"first","affiliation":[{"name":"Seoul National University"}]},{"given":"Yoona","family":"Kim","sequence":"additional","affiliation":[{"name":"Seoul National University"}]},{"given":"Dusol","family":"Lee","sequence":"additional","affiliation":[{"name":"Seoul National University"}]},{"given":"Inhyuk","family":"Choi","sequence":"additional","affiliation":[{"name":"Seoul National University"}]},{"given":"Jihong","family":"Kim","sequence":"additional","affiliation":[{"name":"Seoul National University"}]}],"member":"320","published-online":{"date-parts":[[2022,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Hackers breached colonial pipeline using compromised password. https:\/\/www.bloomberg.com\/news\/articles\/2021-06-04\/hackers-breached-colonial-pipeline-using-compromised-password","author":"Turton W.","year":"2021","unstructured":"W. Turton and K. Mehrotra . Hackers breached colonial pipeline using compromised password. https:\/\/www.bloomberg.com\/news\/articles\/2021-06-04\/hackers-breached-colonial-pipeline-using-compromised-password , 2021 . W. Turton and K. Mehrotra. Hackers breached colonial pipeline using compromised password. https:\/\/www.bloomberg.com\/news\/articles\/2021-06-04\/hackers-breached-colonial-pipeline-using-compromised-password, 2021."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180465.3180467"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of International Conference on Computers and Their Applications","author":"Chew C.","year":"2019","unstructured":"C. Chew and V. Kumar . Behaviour based ransomware detection . In Proceedings of International Conference on Computers and Their Applications , 2019 . C. Chew and V. Kumar. Behaviour based ransomware detection. In Proceedings of International Conference on Computers and Their Applications, 2019."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2013.7.5.03"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of ACM SIGSAC Conference on Computer and Communications Security","author":"Jian H.","year":"2017","unstructured":"H. Jian , J. Xu , X. Xing , P. Liu , and MK. Qureshi . FlashGuard: leveraging intrinsic flash properties to defend against encryption ransomware . In Proceedings of ACM SIGSAC Conference on Computer and Communications Security , 2017 . H. Jian, J. Xu, X. Xing, P. Liu, and MK. Qureshi. FlashGuard: leveraging intrinsic flash properties to defend against encryption ransomware. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security, 2017."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317889"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00089"},{"volume-title":"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-controlled-folders?view=o365-worldwide","year":"2022","key":"e_1_3_2_1_8_1","unstructured":"Microsoft documentation. https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-controlled-folders?view=o365-worldwide , 2022 . Microsoft documentation. https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-controlled-folders?view=o365-worldwide, 2022."},{"key":"e_1_3_2_1_9_1","volume-title":"Windows 10 ransomware protection bypassed using DLL injection. https:\/\/www.bleepingcomputer.com\/news\/security\/windows-10-ransomware-protection-bypassed-using-dll-injection","author":"Abrams L.","year":"2018","unstructured":"L. Abrams . Windows 10 ransomware protection bypassed using DLL injection. https:\/\/www.bleepingcomputer.com\/news\/security\/windows-10-ransomware-protection-bypassed-using-dll-injection , 2018 . L. Abrams. Windows 10 ransomware protection bypassed using DLL injection. https:\/\/www.bleepingcomputer.com\/news\/security\/windows-10-ransomware-protection-bypassed-using-dll-injection, 2018."},{"key":"e_1_3_2_1_10_1","volume-title":"Malware in Linux: kernel-mode-rootkits. https:\/\/www.incibe-cert.es\/en\/blog\/kernel-rootkits-en","author":"Lopez A.","year":"2015","unstructured":"A. Lopez . Malware in Linux: kernel-mode-rootkits. https:\/\/www.incibe-cert.es\/en\/blog\/kernel-rootkits-en , 2015 . A. Lopez. Malware in Linux: kernel-mode-rootkits. https:\/\/www.incibe-cert.es\/en\/blog\/kernel-rootkits-en, 2015."},{"volume-title":"kernel mode. https:\/\/resources.infosecinstitute.com\/topic\/rootkits-user-mode-kernel-mode-part-2\/","year":"2015","key":"e_1_3_2_1_11_1","unstructured":"Rootkits : kernel mode. https:\/\/resources.infosecinstitute.com\/topic\/rootkits-user-mode-kernel-mode-part-2\/ , 2015 . Rootkits: kernel mode. https:\/\/resources.infosecinstitute.com\/topic\/rootkits-user-mode-kernel-mode-part-2\/, 2015."},{"volume-title":"https:\/\/www.kernel.org\/doc\/html\/v4.15\/admin-guide\/module-signing.html","year":"2022","key":"e_1_3_2_1_12_1","unstructured":"The Linux kernel documentation. https:\/\/www.kernel.org\/doc\/html\/v4.15\/admin-guide\/module-signing.html , 2022 . The Linux kernel documentation. https:\/\/www.kernel.org\/doc\/html\/v4.15\/admin-guide\/module-signing.html, 2022."},{"volume-title":"https:\/\/csrc.nist.gov\/csrc\/media\/projects\/cryptographic-module-validation-program\/documents\/security-policies\/140sp1327.pdf","year":"2022","key":"e_1_3_2_1_13_1","unstructured":"Windows 7 code integrity security policy. https:\/\/csrc.nist.gov\/csrc\/media\/projects\/cryptographic-module-validation-program\/documents\/security-policies\/140sp1327.pdf , 2022 . Windows 7 code integrity security policy. https:\/\/csrc.nist.gov\/csrc\/media\/projects\/cryptographic-module-validation-program\/documents\/security-policies\/140sp1327.pdf, 2022."},{"volume-title":"https:\/\/www.ptsecurity.com\/upload\/corporate\/ru-ru\/analytics\/Windows_81_Kernel_Patch_Protection_Analysis.pdf","year":"2014","key":"e_1_3_2_1_14_1","unstructured":"Microsoft Windows 8.1 kernel patch protection analysis. https:\/\/www.ptsecurity.com\/upload\/corporate\/ru-ru\/analytics\/Windows_81_Kernel_Patch_Protection_Analysis.pdf , 2014 . Microsoft Windows 8.1 kernel patch protection analysis. https:\/\/www.ptsecurity.com\/upload\/corporate\/ru-ru\/analytics\/Windows_81_Kernel_Patch_Protection_Analysis.pdf, 2014."},{"key":"e_1_3_2_1_15_1","unstructured":"Radare2. https:\/\/github.com\/radareorg\/radare2.  Radare2. https:\/\/github.com\/radareorg\/radare2."},{"key":"e_1_3_2_1_16_1","unstructured":"Linker and libraries guide. https:\/\/docs.oracle.com\/cd\/E26505_01\/html\/E26506\/glmqp.html.  Linker and libraries guide. https:\/\/docs.oracle.com\/cd\/E26505_01\/html\/E26506\/glmqp.html."},{"key":"e_1_3_2_1_17_1","unstructured":"Freedom. https:\/\/github.com\/sifive\/freedom.  Freedom. https:\/\/github.com\/sifive\/freedom."},{"key":"e_1_3_2_1_18_1","unstructured":"Xilinx virtex-7 FPGA vc707 evaluation kit. https:\/\/www.xilinx.com\/products\/boards-and-kits\/ek-v7-vc707-g.html.  Xilinx virtex-7 FPGA vc707 evaluation kit. https:\/\/www.xilinx.com\/products\/boards-and-kits\/ek-v7-vc707-g.html."},{"key":"e_1_3_2_1_19_1","unstructured":"OpenSSD. http:\/\/openssd.io\/.  OpenSSD. http:\/\/openssd.io\/."},{"key":"e_1_3_2_1_20_1","unstructured":"OpenSSD greedy-FTL (run-gftl3). https:\/\/github.com\/CRZ-Technology\/OpenSSD-OpenChannelSSD\/tree\/main\/CosmosPlus\/OpenSSD\/Toshiba_NAND\/cosm-plus-ns_19.1_20211216\/cosm-plus-sys\/cosm-plus-sys.sdk\/run-gftl3.  OpenSSD greedy-FTL (run-gftl3). https:\/\/github.com\/CRZ-Technology\/OpenSSD-OpenChannelSSD\/tree\/main\/CosmosPlus\/OpenSSD\/Toshiba_NAND\/cosm-plus-ns_19.1_20211216\/cosm-plus-sys\/cosm-plus-sys.sdk\/run-gftl3."},{"key":"e_1_3_2_1_21_1","unstructured":"GonnaCry. https:\/\/github.com\/tarcisio-marinho\/GonnaCry.  GonnaCry. https:\/\/github.com\/tarcisio-marinho\/GonnaCry."},{"key":"e_1_3_2_1_22_1","unstructured":"RAASNet. https:\/\/github.com\/leonv024\/RAASNet.  RAASNet. https:\/\/github.com\/leonv024\/RAASNet."},{"key":"e_1_3_2_1_23_1","unstructured":"Ransom0. https:\/\/github.com\/HugoLB0\/Ransom0.  Ransom0. https:\/\/github.com\/HugoLB0\/Ransom0."},{"key":"e_1_3_2_1_24_1","unstructured":"Hidden-tear. https:\/\/github.com\/starf1ame\/Hidden-tear.  Hidden-tear. https:\/\/github.com\/starf1ame\/Hidden-tear."},{"key":"e_1_3_2_1_25_1","unstructured":"FScoiety. https:\/\/github.com\/graniet\/fsociety-ransomware-MrRobot.  FScoiety. https:\/\/github.com\/graniet\/fsociety-ransomware-MrRobot."},{"key":"e_1_3_2_1_26_1","unstructured":"MariaDB. https:\/\/mariadb.com.  MariaDB. https:\/\/mariadb.com."},{"key":"e_1_3_2_1_27_1","unstructured":"RocksDB. http:\/\/rocksdb.org.  RocksDB. http:\/\/rocksdb.org."},{"key":"e_1_3_2_1_28_1","unstructured":"GCC the GNU compiler collection. https:\/\/gcc.gnu.org.  GCC the GNU compiler collection. https:\/\/gcc.gnu.org."},{"key":"e_1_3_2_1_29_1","unstructured":"Bacula. https:\/\/www.bacula.org.  Bacula. https:\/\/www.bacula.org."},{"key":"e_1_3_2_1_30_1","unstructured":"Sysbench. https:\/\/github.com\/akopytov\/sysbench.  Sysbench. https:\/\/github.com\/akopytov\/sysbench."},{"key":"e_1_3_2_1_31_1","unstructured":"RocksDB document. https:\/\/www.bookstack.cn\/read\/rocksdb-en\/961dd924ca767aa1.md.  RocksDB document. https:\/\/www.bookstack.cn\/read\/rocksdb-en\/961dd924ca767aa1.md."},{"key":"e_1_3_2_1_32_1","unstructured":"Micron technical note. https:\/\/www.micron.com\/-\/media\/client\/global\/documents\/products\/technical-note\/nand-flash\/tn2914.pdf.  Micron technical note. https:\/\/www.micron.com\/-\/media\/client\/global\/documents\/products\/technical-note\/nand-flash\/tn2914.pdf."}],"event":{"name":"HotStorage '22: 14th ACM Workshop on Hot Topics in Storage and File Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"],"location":"Virtual Event","acronym":"HotStorage '22"},"container-title":["Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538643.3539749","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538643.3539749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:03:02Z","timestamp":1750186982000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538643.3539749"}},"subtitle":["protecting files from ransomware attacks using fine-grained I\/O whitelisting"],"short-title":[],"issued":{"date-parts":[[2022,6,27]]},"references-count":32,"alternative-id":["10.1145\/3538643.3539749","10.1145\/3538643"],"URL":"https:\/\/doi.org\/10.1145\/3538643.3539749","relation":{},"subject":[],"published":{"date-parts":[[2022,6,27]]},"assertion":[{"value":"2022-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}