{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:36:40Z","timestamp":1774633000261,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":105,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,11,22]],"date-time":"2026-11-22T00:00:00Z","timestamp":1795305600000},"content-version":"vor","delay-in-days":368,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1815883, CNS-2055014"],"award-info":[{"award-number":["CNS-1815883, CNS-2055014"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765135","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:33:16Z","timestamp":1763854396000},"page":"171-185","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Enabling Secure and Efficient Data Loss Prevention with a Retention-aware Versioning SSD"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9812-6634","authenticated-orcid":false,"given":"Weidong","family":"Zhu","sequence":"first","affiliation":[{"name":"Florida International University, Miami, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4717-6316","authenticated-orcid":false,"given":"Carson","family":"Stillman","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3630-6269","authenticated-orcid":false,"given":"Sara","family":"Rampazzi","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7498-4239","authenticated-orcid":false,"given":"Kevin R. B.","family":"Butler","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, Florida, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bloom Filter Calculator. https:\/\/hur.st\/bloomfilter\/."},{"key":"e_1_3_2_1_2_1","unstructured":"C Bloom Filter Library. http:\/\/www.partow.net\/programming\/bloomfilter\/index.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Flexible I\/O Tester. https:\/\/github.com\/axboe\/fio."},{"key":"e_1_3_2_1_4_1","unstructured":"How to Escalate Privileges in Linux Privilege Escalation Techniques. https:\/\/systemweakness.com\/how-to-escalate-privileges-in-linux-privilege-escalation-techniques-70c92499ae45."},{"key":"e_1_3_2_1_5_1","unstructured":"LibLZF. http:\/\/oldhome.schmorp.de\/marc\/liblzf.html."},{"key":"e_1_3_2_1_6_1","unstructured":"NILFS: Continuous Snapshotting Filesystem for Linux. https:\/\/nilfs.sourceforge.io\/en\/index.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Understanding Privilege Escalation and 5 Common Attack Techniques. https:\/\/www.cynet.com\/network-attacks\/privilege-escalation\/#: :text=Privilege%20escalation%20is%20a%20type gaining%20access%20to%20a%20system."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/duo.com\/decipher\/new-zerocleare-wiper-malware-used-in-targeted-attacks","author":"ZeroCleare Wiper Malware New","year":"2019","unstructured":"New ZeroCleare Wiper Malware Used in Targeted Attacks. https:\/\/duo.com\/decipher\/new-zerocleare-wiper-malware-used-in-targeted-attacks, 2019."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/spectrum.ieee.org\/tech-talk\/telecom\/security\/iran-wiper-malware-cybersecurity-us-military-strike-news-experts-warning","author":"Deploy Wiper Iran May","year":"2020","unstructured":"Iran May Deploy Wiper Malware in Response to U.S. Military Strike, Experts Warn. https:\/\/spectrum.ieee.org\/tech-talk\/telecom\/security\/iran-wiper-malware-cybersecurity-us-military-strike-news-experts-warning, 2020."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/blog.purestorage.com\/purely-technical\/monitoring-snapshot-space-consumption-with-pure-storage-flasharray\/","author":"Space Monitoring Snapshot","year":"2020","unstructured":"Monitoring Snapshot Space Consumption with Pure Storage FlashArray. https:\/\/blog.purestorage.com\/purely-technical\/monitoring-snapshot-space-consumption-with-pure-storage-flasharray\/, 2020."},{"key":"e_1_3_2_1_11_1","volume-title":"The science of reclaiming ssd storage space. https:\/\/www.atpinc.com\/blog\/how-trim-ssd-works-to-free-storage-space","year":"2020","unstructured":"Trim\/deallocation and garbage collection: The science of reclaiming ssd storage space. https:\/\/www.atpinc.com\/blog\/how-trim-ssd-works-to-free-storage-space, 2020."},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/github.com\/alibaba\/block-traces","author":"Traces Alibaba Block","year":"2022","unstructured":"Alibaba Block Traces. https:\/\/github.com\/alibaba\/block-traces, 2022."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/semiconductor.samsung.com\/us\/consumer-storage\/internal-ssd\/980pro\/","author":"PRO","year":"2023","unstructured":"980 PRO PCIe 4.0 NVMe SSD 1TB. https:\/\/semiconductor.samsung.com\/us\/consumer-storage\/internal-ssd\/980pro\/, 2023."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/cve.mitre.org\/index.html","author":"CVE","year":"2023","unstructured":"CVE - CVE. https:\/\/cve.mitre.org\/index.html, 2023."},{"key":"e_1_3_2_1_15_1","unstructured":"Data retention periods and their impact in analyzing user behavior. https:\/\/www.smartlook.com\/blog\/data-retention-period-user-behavior-analysis\/#: :text=Data%20retention%20and%20data%20retention%20periods -In%20analytics%20tools&text=Typically%2C%20the%20minimum%20data%20retention data%20retention%20timeframe%2C%20the%20better 2023."},{"key":"e_1_3_2_1_16_1","volume-title":"Yes It Is. https:\/\/weareproactive.com\/cloud-storage-data-loss-is-possible\/","author":"Storage Data Loss Is Cloud","year":"2023","unstructured":"Is Cloud Storage Data Loss Possible? According to Microsoft, Yes It Is. https:\/\/weareproactive.com\/cloud-storage-data-loss-is-possible\/, 2023."},{"key":"e_1_3_2_1_17_1","volume-title":"the biggest internal, portable and external storage devices you can buy. https:\/\/www.techradar.com\/best\/large-hard-drives-and-ssds","author":"Ds Largest","year":"2023","unstructured":"Largest SSDs and hard drives of 2023: the biggest internal, portable and external storage devices you can buy. https:\/\/www.techradar.com\/best\/large-hard-drives-and-ssds, 2023."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/semiconductor.samsung.com\/consumer-storage\/internal-ssd\/870qvo\/","author":"Samsung","year":"2023","unstructured":"Samsung 870 QVO SATA 2.5 SSD. https:\/\/semiconductor.samsung.com\/consumer-storage\/internal-ssd\/870qvo\/, 2023."},{"key":"e_1_3_2_1_19_1","volume-title":"More Layers Brings More Performance. https:\/\/www.tomshardware.com\/reviews\/samsung-970-evo-plus-ssd,5608.html","author":"Review Samsung","year":"2023","unstructured":"Samsung 970 EVO Plus SSD Review: More Layers Brings More Performance. https:\/\/www.tomshardware.com\/reviews\/samsung-970-evo-plus-ssd,5608.html, 2023."},{"key":"e_1_3_2_1_20_1","volume-title":"https:\/\/hothardware.com\/news\/falling-ssd-prices-show-no-signs-slowing-down","author":"Makers But Sorry Storage","year":"2023","unstructured":"Sorry Storage Makers But Falling SSD Prices Show No Signs Of Slowing Down This Summer. https:\/\/hothardware.com\/news\/falling-ssd-prices-show-no-signs-slowing-down, 2023."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/www.theregister.com\/2014\/09\/24\/storage_supercapacitors\/","author":"Supercapacitors","year":"2023","unstructured":"Supercapacitors have the power to save you from data loss. https:\/\/www.theregister.com\/2014\/09\/24\/storage_supercapacitors\/, 2023."},{"key":"e_1_3_2_1_22_1","unstructured":"What is a USB security key and how do you use it? https:\/\/www.tomsguide.com\/news\/usb-security-key 2023."},{"key":"e_1_3_2_1_23_1","unstructured":"What Is QLC SSD? https:\/\/www.purestorage.com\/knowledge\/what-is-qlc-flash.html 2023."},{"key":"e_1_3_2_1_24_1","volume-title":"https:\/\/www.datasheetarchive.com\/whats_new\/1c1a884377ab1954f2efc54b614636ec.html","author":"Ssd","year":"2024","unstructured":"Ssd security firmwares features tech brief. https:\/\/www.datasheetarchive.com\/whats_new\/1c1a884377ab1954f2efc54b614636ec.html, 2024."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384717"},{"key":"e_1_3_2_1_26_1","volume-title":"Blake2: simpler, smaller, fast as md5. https:\/\/www.blake2.net\/blake2.pdf","author":"Aumasson Jean-Philippe","year":"2013","unstructured":"Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, and Christian Winnerlein. Blake2: simpler, smaller, fast as md5. https:\/\/www.blake2.net\/blake2.pdf, 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00089"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/377069.377091"},{"key":"e_1_3_2_1_29_1","volume-title":"Contractor hacks former employer, destroys and corrupts data. https:\/\/www.csoonline.com\/article\/564205\/contractor-hacks-former-employer-destroys-and-corrupts-data.html","author":"Burgess Christopher","year":"2018","unstructured":"Christopher Burgess. Contractor hacks former employer, destroys and corrupts data. https:\/\/www.csoonline.com\/article\/564205\/contractor-hacks-former-employer-destroys-and-corrupts-data.html, 2018."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244248"},{"key":"e_1_3_2_1_31_1","volume-title":"9th USENIX Conference on File and Storage Technologies (FAST)","author":"Chen Feng","year":"2011","unstructured":"Feng Chen, Tian Luo, and Xiaodong Zhang. CAFTL: A Content-Aware flash translation layer enhancing the lifespan of flash memory based solid state drives. In 9th USENIX Conference on File and Storage Technologies (FAST), 2011."},{"key":"e_1_3_2_1_32_1","volume-title":"Protecting file systems: A survey of backup techniques","author":"Chervenak Ann","year":"1998","unstructured":"Ann Chervenak, Vivekanand Vellanki, and Zack Kurmas. Protecting file systems: A survey of backup techniques. 1998."},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX Annual Technical Conference (USENIX ATC)","author":"Cornell Brian","year":"2004","unstructured":"Brian Cornell, Peter A. Dinda, and Fabi\u00e1n E. Bustamante. Wayback: A user-level versioning file system for linux. In USENIX Annual Technical Conference (USENIX ATC), 2004."},{"key":"e_1_3_2_1_34_1","volume-title":"Q4 Travelers' Cyber Threat Report: Ransomware Goes Full Scale. https:\/\/www.corvusinsurance.com\/blog\/q4-2024-travelers-cyber-threat-report\/","author":"CORVUS.","year":"2025","unstructured":"CORVUS. Q4 Travelers' Cyber Threat Report: Ransomware Goes Full Scale. https:\/\/www.corvusinsurance.com\/blog\/q4-2024-travelers-cyber-threat-report\/, 2025."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060316"},{"key":"e_1_3_2_1_36_1","volume-title":"2010 USENIX Annual Technical Conference (USENIX ATC)","author":"Debnath Biplob","year":"2010","unstructured":"Biplob Debnath, Sudipta Sengupta, and Jin Li. ChunkStash: Speeding up inline storage deduplication using flash memory. In 2010 USENIX Annual Technical Conference (USENIX ATC), 2010."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1070838.1070856"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685090"},{"key":"e_1_3_2_1_39_1","volume-title":"Colonial Pipeline attack: A 'wake up call' about the threat of ransomware. https:\/\/www.cnn.com\/2021\/05\/16\/tech\/colonial-ransomware-darkside-what-to-know\/index.html","author":"Duffy Clare","year":"2021","unstructured":"Clare Duffy. Colonial Pipeline attack: A 'wake up call' about the threat of ransomware. https:\/\/www.cnn.com\/2021\/05\/16\/tech\/colonial-ransomware-darkside-what-to-know\/index.html, 2021."},{"key":"e_1_3_2_1_40_1","volume-title":"Trusted Platform Module (TPM) Summary. https:\/\/trustedcomputinggroup.org\/resource\/trusted-platform-module-tpm-summary\/","author":"Trusted Computing Group","year":"2025","unstructured":"Trusted Computing Group. Trusted Platform Module (TPM) Summary. https:\/\/trustedcomputinggroup.org\/resource\/trusted-platform-module-tpm-summary\/, 2025."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2017.55"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","author":"Gupta Aayush","year":"2009","unstructured":"Aayush Gupta, Youngjae Kim, and Bhuvan Urgaonkar. Dftl: A flash translation layer employing demand-based selective caching of page-level address mappings. In Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2009."},{"key":"e_1_3_2_1_43_1","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Han Kyuhwa","year":"2021","unstructured":"Kyuhwa Han, Hyunho Gwak, Dongkun Shin, and Jooyoung Hwang. Zns: Advanced zoned namespace interface for supporting in-storage zone compaction. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21), 2021."},{"key":"e_1_3_2_1_44_1","volume-title":"Arpaci-Dusseau. The Unwritten Contract of Solid State Drives. In European Conference on Computer Systems (EuroSys)","author":"He Jun","year":"2017","unstructured":"Jun He, Sudarsun Kannan, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. The Unwritten Contract of Solid State Drives. In European Conference on Computer Systems (EuroSys), 2017."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134035"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2367589.2367597"},{"key":"e_1_3_2_1_47_1","volume-title":"20th USENIX Conference on File and Storage Technologies (FAST 22)","author":"Jaffer Shehbaz","year":"2022","unstructured":"Shehbaz Jaffer, Kaveh Mahdaviani, and Bianca Schroeder. Improving the reliability of next generation SSDs using WOM-v codes. In 20th USENIX Conference on File and Storage Technologies (FAST 22), 2022."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2011.5937215"},{"key":"e_1_3_2_1_49_1","author":"Jung H.","year":"2008","unstructured":"H. Jung, H. Shim, S. Park, S. Kang, and J. Cha. LRU-WSR: integration of LRU and writes sequence reordering for flash memory. In IEEE Transactions on Consumer Electronics, 2008.","journal-title":"In IEEE Transactions on Consumer Electronics"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080236"},{"key":"e_1_3_2_1_51_1","volume-title":"25th USENIX Security Symposium (USENIX Security)","author":"Kharraz Amin","year":"2016","unstructured":"Amin Kharraz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda. UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. In 25th USENIX Security Symposium (USENIX Security), 2016."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_5"},{"key":"e_1_3_2_1_53_1","volume-title":"ACM Transactions on Embedded Computing Systems","author":"Kim Hong Seok","year":"2017","unstructured":"Hong Seok Kim, Eyee Hyun Nam, Ji Hyuck Yun, Sheayun Lee, and Sang Lyul Min. P-bms: A bad block management scheme in parallelized flash memory storage devices. ACM Transactions on Embedded Computing Systems, 2017."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST)","author":"Kim Hyojun","year":"2008","unstructured":"Hyojun Kim and Seongjun Ahn. Bplru: A buffer management scheme for improving random writes in flash storage. In Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST), 2008."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575359"},{"key":"e_1_3_2_1_56_1","volume-title":"8th USENIX Conference on File and Storage Technologies (FAST)","author":"Koller Ricardo","year":"2010","unstructured":"Ricardo Koller and Raju Rangaswami. I\/O deduplication: Utilizing content similarity to improve I\/O performance. In 8th USENIX Conference on File and Storage Technologies (FAST), 2010."},{"key":"e_1_3_2_1_57_1","volume-title":"Manuel Egele. PayBreak: Defense Against Cryptographic Ransomware. In 15th ACM Asia Conference on Computer and Communications Security (ASIACCS)","author":"Kolodenker Eugene","year":"2017","unstructured":"Eugene Kolodenker, William Koch, Gianluca Stringhini, and Manuel Egele. PayBreak: Defense Against Cryptographic Ransomware. In 15th ACM Asia Conference on Computer and Communications Security (ASIACCS), 2017."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190518"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267903.1267924"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.120"},{"key":"e_1_3_2_1_61_1","volume-title":"16th USENIX Conference on File and Storage Technologies (FAST)","author":"Li Huaicheng","year":"2018","unstructured":"Huaicheng Li, Mingzhe Hao, Michael Hao Tong, Swaminathan Sundararaman, Matias Bj\u00f8rling, and Haryadi S. Gunawi. The CASE of FEMU: Cheap, accurate, scalable and extensible flash emulator. In 16th USENIX Conference on File and Storage Technologies (FAST), 2018."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00048"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3229293"},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the 51st International Conference on Parallel Processing (ICPP)","author":"Lin Haodong","year":"2023","unstructured":"Haodong Lin, Zhibing Sha, Jun Li, Zhigang Cai, Balazs Gerofi, Yuanquan Shi, and Jianwei Liao. Dram cache management with request granularity for nand-based ssds. In Proceedings of the 51st International Conference on Parallel Processing (ICPP), 2023."},{"key":"e_1_3_2_1_65_1","volume-title":"Deps: Exploiting a dynamic error prechecking scheme to improve the read performance of ssd","author":"Liu Weihua","year":"2021","unstructured":"Weihua Liu, Fei Wu, Meng Zhang, Chengmo Yang, Zhonghai Lu, Jiguang Wan, and Changsheng Xie. Deps: Exploiting a dynamic error prechecking scheme to improve the read performance of ssd. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1534912.1534913"},{"key":"e_1_3_2_1_67_1","volume-title":"Defense Report","year":"2022","unstructured":"Microsoft. Microsoft Digital Defense Report 2022. https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE5bUvv?culture=en-us&country=us, 2022."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2003.1194861"},{"key":"e_1_3_2_1_69_1","volume-title":"3rd USENIX Conference on File and Storage Technologies (FAST)","author":"Muniswamy-Reddy Kiran-Kumar","year":"2004","unstructured":"Kiran-Kumar Muniswamy-Reddy, Charles P. Wright, Andrew Himmer, and Erez Zadok. A versatile and user-oriented versioning file system. In 3rd USENIX Conference on File and Storage Technologies (FAST), 2004."},{"key":"e_1_3_2_1_70_1","volume-title":"Antony Rowstron. Write Off-Loading: Practical Power Management for Enterprise Storage. In 6th USENIX Conference on File and Storage Technologies (FAST)","author":"Narayanan Dushyanth","year":"2008","unstructured":"Dushyanth Narayanan, Austin Donnelly, and Antony Rowstron. Write Off-Loading: Practical Power Management for Enterprise Storage. In 6th USENIX Conference on File and Storage Technologies (FAST), 2008."},{"key":"e_1_3_2_1_71_1","volume-title":"Wiper Attacks Against Israel & Albania. https:\/\/www.darkreading.com\/threat-intelligence\/iran-apts-tag-team-espionage-wiper-attacks-against-israel-and-albania","author":"Nelson Nate","year":"2024","unstructured":"Nate Nelson. Iran APTs Tag Team Espionage, Wiper Attacks Against Israel & Albania. https:\/\/www.darkreading.com\/threat-intelligence\/iran-apts-tag-team-espionage-wiper-attacks-against-israel-and-albania, 2024."},{"key":"e_1_3_2_1_72_1","volume-title":"A new variant from Chaos Ransomware family surfaces. https:\/\/www.sonicwall.com\/blog\/a-new-variant-from-chaos-ransomware-family-surfaces","author":"News Security","year":"2023","unstructured":"Security News. A new variant from Chaos Ransomware family surfaces. https:\/\/www.sonicwall.com\/blog\/a-new-variant-from-chaos-ransomware-family-surfaces, 2023."},{"key":"e_1_3_2_1_73_1","volume-title":"What is SamSam ransomware? https:\/\/www.nomios.com\/resources\/what-is-samsam-ransomware\/","year":"2024","unstructured":"Nomios. What is SamSam ransomware? https:\/\/www.nomios.com\/resources\/what-is-samsam-ransomware\/, 2024."},{"key":"e_1_3_2_1_74_1","volume-title":"Proceedings of the VLDB Endowment","author":"Park Jonghyeok","year":"2023","unstructured":"Jonghyeok Park, Soyee Choi, Gihwan Oh, Soojun Im, Moon-Wook Oh, and Sang-Won Lee. Flashalloc: Dedicating flash blocks by objects. Proceedings of the VLDB Endowment, 2023."},{"key":"e_1_3_2_1_75_1","volume-title":"Partial page programming of multi level flash","author":"Parker Allan","year":"2004","unstructured":"Allan Parker and Glen Lam. Partial page programming of multi level flash, 2004. Patent No. US6836432B1, Filed Feb. 11th., 2002, Issued Dec. 28th., 2004."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063786.1063789"},{"key":"e_1_3_2_1_77_1","volume-title":"A Closer Look at NotPetya. https:\/\/www.portnox.com\/cybersecurity-101\/notpetya-attack\/","year":"2017","unstructured":"Portnox. A Closer Look at NotPetya. https:\/\/www.portnox.com\/cybersecurity-101\/notpetya-attack\/, 2017."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024730"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507773"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA604306"},{"key":"e_1_3_2_1_81_1","volume-title":"Power loss protection (PLP): Protect your data against sudden power loss. https:\/\/download.semiconductor.samsung.com\/resources\/others\/Samsung_SSD_845DC_05_Power_loss_protection_PLP.pdf","year":"2014","unstructured":"Samsung. Power loss protection (PLP): Protect your data against sudden power loss. https:\/\/download.semiconductor.samsung.com\/resources\/others\/Samsung_SSD_845DC_05_Power_loss_protection_PLP.pdf, 2014."},{"key":"e_1_3_2_1_82_1","unstructured":"Samsung. To be? or Not to be? Hold up capacitors in 2.5'' MIL SSDs. https:\/\/www.storagesearch.com\/zero-to-three-hold-up-times-in-mil-ssds.html#: :text=Power%20hold%20up%20time%20in%200%20to in%20the%20event%20of%20sudden%20power%20loss. 2015."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.46"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.5555\/2591305.2591333"},{"key":"e_1_3_2_1_85_1","unstructured":"Ryan Soliven and Hitomi Kimura. Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus. https:\/\/www.trendmicro.com\/en_us\/research\/22\/h\/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html 2022."},{"key":"e_1_3_2_1_86_1","volume-title":"Proceedings of the 4th Conference on Symposium on Operating System Design and Implementation (OSDI)","author":"Strunk John D.","year":"2000","unstructured":"John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, and Gregory R. Ganger. Self-securing storage: Protecting data in compromised system. In Proceedings of the 4th Conference on Symposium on Operating System Design and Implementation (OSDI), 2000."},{"key":"e_1_3_2_1_87_1","volume-title":"9th European Conference on Computer Systems (EuroSys 2014)","author":"Subramanian Sriram","year":"2014","unstructured":"Sriram Subramanian, Swaminathan Sundararaman, Nisha Talagala, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. Snapshots in a flash with iosnap. In 9th European Conference on Computer Systems (EuroSys 2014), 2014."},{"key":"e_1_3_2_1_88_1","volume-title":"Co-active: A workload-aware collaborative cache management scheme for nvme ssds","author":"Sun Hui","year":"2021","unstructured":"Hui Sun, Shangshang Dai, Jianzhong Huang, and Xiao Qin. Co-active: A workload-aware collaborative cache management scheme for nvme ssds. IEEE Transactions on Parallel and Distributed Systems, 2021."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102896"},{"key":"e_1_3_2_1_90_1","volume-title":"16th USENIX Conference on File and Storage Technologies (FAST 18)","author":"Tavakkol Arash","year":"2018","unstructured":"Arash Tavakkol, Juan G\u00f3mez-Luna, Mohammad Sadrosadati, Saugata Ghose, and Onur Mutlu. MQSim: A framework for enabling realistic studies of modern Multi-Queue SSD devices. In 16th USENIX Conference on File and Storage Technologies (FAST 18), 2018."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829974"},{"key":"e_1_3_2_1_92_1","volume-title":"Less than Half of Recorded Incidents Resulted in Victim Payments. https:\/\/www.chainalysis.com\/blog\/crypto-crime-ransomware-victim-extortion-2025\/","author":"Team Chainalysis","year":"2025","unstructured":"Chainalysis Team. 35% Year-over-Year Decrease in Ransomware Payments, Less than Half of Recorded Incidents Resulted in Victim Payments. https:\/\/www.chainalysis.com\/blog\/crypto-crime-ransomware-victim-extortion-2025\/, 2025."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2010.5570003"},{"key":"e_1_3_2_1_94_1","volume-title":"10th ACM Conference on Data and Application Security and Privacy (CODASPY)","author":"Wang Peiying","year":"2019","unstructured":"Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, and Peng Liu. MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. In 10th ACM Conference on Data and Application Security and Privacy (CODASPY), 2019."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00054"},{"key":"e_1_3_2_1_96_1","volume-title":"14th European Conference on Computer Systems (EuroSys)","author":"Wang Xiaohao","year":"2019","unstructured":"Xiaohao Wang, Yifan Yuan, You Zhou, Chance C. Coats, and Jian Huang. Project almanac: A time-traveling solid-state drive. In 14th European Conference on Computer Systems (EuroSys), 2019."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273018"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD50377.2020.00039"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2571298"},{"key":"e_1_3_2_1_100_1","volume-title":"A case for continuous data protection at block level in disk array storages","author":"Xiao Weijun","year":"2009","unstructured":"Weijun Xiao, Jin Ren, and Qing Yang. A case for continuous data protection at block level in disk array storages. IEEE Transactions on Parallel and Distributed Systems, 2009."},{"key":"e_1_3_2_1_101_1","volume-title":"16th USENIX Conference on File and Storage Technologies (FAST 18)","author":"Yeon Jeseong","year":"2018","unstructured":"Jeseong Yeon, Minseong Jeong, Sungjin Lee, and Eunji Lee. RFLUSH: Rethink the flush. In 16th USENIX Conference on File and Storage Technologies (FAST 18), 2018."},{"key":"e_1_3_2_1_102_1","volume-title":"How to Detect and Prevent Dropper Malware Attacks. https:\/\/perception-point.io\/guides\/malware\/understanding-dropper-malware-types-examples-detection-and-prevention\/","author":"Zamir Tal","year":"2024","unstructured":"Tal Zamir. How to Detect and Prevent Dropper Malware Attacks. https:\/\/perception-point.io\/guides\/malware\/understanding-dropper-malware-types-examples-detection-and-prevention\/, 2024."},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179372"},{"key":"e_1_3_2_1_104_1","volume-title":"Nasa: Nvm-assisted secure deletion for flash memory","author":"Zhu Weidong","year":"2022","unstructured":"Weidong Zhu and Kevin R. B. Butler. Nasa: Nvm-assisted secure deletion for flash memory. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2022."},{"key":"e_1_3_2_1_105_1","volume-title":"Proceedings of the 38th International Conference on Massive Storage Systems and Technology (MSST)","author":"Zhu Weidong","year":"2024","unstructured":"Weidong Zhu, Grant Hernandez, Washington Garcia, Dave (Jing) Tian, Sara Rampazzi, and Kevin R. B. Butler. Minding the semantic gap for effective storage-based ransomware defense. In Proceedings of the 38th International Conference on Massive Storage Systems and Technology (MSST), 2024."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765135","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:19:41Z","timestamp":1766441981000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":105,"alternative-id":["10.1145\/3719027.3765135","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765135","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}