{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T16:20:22Z","timestamp":1778948422573,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Qualcomm incorporated","award":["20220 Qualcomm Faculty Award"],"award-info":[{"award-number":["20220 Qualcomm Faculty Award"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3695794.3695804","type":"proceedings-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T04:06:53Z","timestamp":1733976413000},"page":"104-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["CARDR: DRAM Cache Assisted Ransomware Detection and Recovery in SSDs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8020-9575","authenticated-orcid":false,"given":"Waqar Hassan","family":"Mir","sequence":"first","affiliation":[{"name":"Indian Institute Of Technology, Ropar, Rupnagar, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3824-9437","authenticated-orcid":false,"given":"Neeraj","family":"Goel","sequence":"additional","affiliation":[{"name":"Indian Institute Of Technology, Ropar, Rupnagar, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6596-2292","authenticated-orcid":false,"given":"Venkata Kalyan","family":"Tavva","sequence":"additional","affiliation":[{"name":"Indian Institute Of Technology, Ropar, Rupnagar, Punjab, India"}]}],"member":"320","published-online":{"date-parts":[[2024,12,11]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"Appknox. 2019. 20 Cybersecurity Statistics That Matter in 2019. https:\/\/www.appknox.com\/blog\/cybersecurity-statistics-2019 Accessed: 2024-05-25."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00089"},{"key":"e_1_3_3_1_4_2","unstructured":"Sungha Baek Youngdon Jung David Mohaisen Sungjin Lee and Daehun Nyang. 2020. SSD-assisted ransomware detection and data recovery techniques. IEEE Trans. Comput. 70 10 (2020) 1762\u20131776."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Feng Chen David\u00a0A Koufaty and Xiaodong Zhang. 2009. Understanding intrinsic characteristics and system implications of flash memory based solid state drives. ACM SIGMETRICS Performance Evaluation Review 37 1 (2009) 181\u2013192.","DOI":"10.1145\/2492101.1555371"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"key":"e_1_3_3_1_7_2","unstructured":"Microsoft Corporation. [n. d.]. DiskMon. https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/diskmon. Accessed: 2024-06-01."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Damien\u00a0Warren Fernando and Nikos Komninos. 2024. FeSAD ransomware detection framework with machine learning using adaption to concept drift. Computers and Security 137 (2024) 103629.","DOI":"10.1016\/j.cose.2023.103629"},{"key":"e_1_3_3_1_9_2","unstructured":"Recorded Future. 2024. Types of Ransomware. https:\/\/www.recordedfuture.com\/threat-intelligence-101\/cyber-threats\/types-of-ransomware. Accessed: 2024-08-31."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Mohana Gopinath and Sibi\u00a0Chakkaravarthy Sethuraman. 2023. A comprehensive survey on deep learning based malware detection techniques. Computer Science Review 47 (2023) 100529.","DOI":"10.1016\/j.cosrev.2022.100529"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00045"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Manabu Hirano Ryo Hodota and Ryotaro Kobayashi. 2022. RanSAP: An open dataset of ransomware storage access patterns for training machine learning models. Forensic Science International: Digital Investigation 40 (2022) 301314.","DOI":"10.1016\/j.fsidi.2021.301314"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Yang Hu Hong Jiang Dan Feng Lei Tian Hao Luo and Chao Ren. 2012. Exploring and exploiting the multilevel parallelism inside SSDs for improved performance and endurance. IEEE Trans. Comput. 62 6 (2012) 1141\u20131155.","DOI":"10.1109\/TC.2012.60"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134035"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Jamil Ispahany MD\u00a0Rafiqul Islam Md\u00a0Zahidul Islam and M\u00a0Arif Khan. 2024. Ransomware detection using machine learning: A review research limitations and future directions. IEEE Access (2024).","DOI":"10.1109\/ACCESS.2024.3397921"},{"key":"e_1_3_3_1_16_2","first-page":"757","volume-title":"25th USENIX security symposium (USENIX Security 16)","author":"Kharaz Amin","year":"2016","unstructured":"Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda. 2016. { UNVEIL} : A { Large-Scale}, automated approach to detecting ransomware. In 25th USENIX security symposium (USENIX Security 16). 757\u2013772."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.5555\/3323298.3323325"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Sandeep Kumar and Eugene\u00a0H Spafford. 1992. A generic virus scanner in C++. (1992).","DOI":"10.1109\/CSAC.1992.228218"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Donghyun Min Yungwoo Ko Ryan Walker Junghee Lee and Youngjae Kim. 2021. A content-based ransomware detection and backup solid-state drive for ransomware defense. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 41 7 (2021) 2038\u20132051.","DOI":"10.1109\/TCAD.2021.3099084"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Donghyun Min Donggyu Park Jinwoo Ahn Ryan Walker Junghee Lee Sungyong Park and Youngjae Kim. 2018. Amoeba: An autonomous backup and recovery SSD for ransomware attack defense. IEEE Computer Architecture Letters 17 2 (2018) 245\u2013248.","DOI":"10.1109\/LCA.2018.2883431"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317889"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"e_1_3_3_1_23_2","first-page":"101","volume-title":"FAST","author":"Soundararajan Gokul","year":"2010","unstructured":"Gokul Soundararajan, Vijayan Prabhakaran, Mahesh Balakrishnan, and Ted Wobber. 2010. Extending SSD Lifetimes with Disk-Based Write Caches.. In FAST, Vol.\u00a010. 101\u2013114."},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Hui Sun Shangshang Dai Jianzhong Huang Yinliang Yue and Xiao Qin. 2023. DAC: A dynamic active and collaborative cache management scheme for solid state disks. Journal of Systems Architecture 140 (2023) 102896.","DOI":"10.1016\/j.sysarc.2023.102896"},{"key":"e_1_3_3_1_25_2","unstructured":"Sangfor Technologies. 2023. List of Top Ransomware Attacks in 2023. https:\/\/www.sangfor.com\/blog\/cybersecurity\/list-of-top-ransomware-attacks-in-2023 Accessed: 2024-05-25."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Patrick Traynor Michael Chien Scott Weaver Boniface Hicks and Patrick McDaniel. 2008. Noninvasive methods for host certification. ACM Transactions on Information and System Security (TISSEC) 11 3 (2008) 1\u201323.","DOI":"10.1145\/1341731.1341737"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Shivani Tripathy and Manoranjan Satpathy. 2022. SSD internal cache management policies: A survey. Journal of Systems Architecture 122 (2022) 102334.","DOI":"10.1016\/j.sysarc.2021.102334"},{"key":"e_1_3_3_1_28_2","unstructured":"Varonis. 2024. PeStudio: A Comprehensive Tool for Analyzing Windows Executables. https:\/\/www.varonis.com\/blog\/pestudio"},{"key":"e_1_3_3_1_29_2","volume-title":"Ransomware Attack Every 14 Seconds","author":"Ventures Cybersecurity","year":"2019","unstructured":"Cybersecurity Ventures. 2019. Ransomware Attack Every 14 Seconds. https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021\/ URL: https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021\/."},{"key":"e_1_3_3_1_30_2","unstructured":"VirusTotal. 2024. VirusTotal - Free Online Virus Malware and URL Scanner. https:\/\/www.virustotal.com\/gui\/home\/upload Accessed: 2024-05-25."},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.56"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_27"},{"key":"e_1_3_3_1_33_2","first-page":"1061","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Zhang-Kennedy Leah","year":"2018","unstructured":"Leah Zhang-Kennedy, Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, and Sonia Chiasson. 2018. The aftermath of a crypto-ransomware attack at a large academic institution. In 27th USENIX Security Symposium (USENIX Security 18). 1061\u20131078."}],"event":{"name":"MEMSYS '24: The International Symposium on Memory Systems","location":"Washington DC USA","acronym":"MEMSYS '24"},"container-title":["Proceedings of the International Symposium on Memory Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695794.3695804","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695794.3695804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:06Z","timestamp":1750295406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695794.3695804"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":32,"alternative-id":["10.1145\/3695794.3695804","10.1145\/3695794"],"URL":"https:\/\/doi.org\/10.1145\/3695794.3695804","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-12-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}