[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hsu et al., 2016 - Google Patents

Data concealments with high privacy in new technology file system

Hsu et al., 2016

Document ID
3060089093548850468
Author
Hsu F
Wu M
Ou S
Wang S
Publication year
Publication venue
The Journal of Supercomputing

External Links

Snippet

This paper proposes a new approach, called file concealer (FC), to conceal files in a computer system. FC modifies metadata about a file in NTFS (New Technology File System) to hide the file. Unlike traditional hooking methods which can be easily detected by antivirus …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/30144Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
    • G06F3/0601Dedicated interfaces to storage systems
    • G06F3/0602Dedicated interfaces to storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
    • G06F3/0601Dedicated interfaces to storage systems
    • G06F3/0628Dedicated interfaces to storage systems making use of a particular technique
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring

Similar Documents

Publication Publication Date Title
TWI786399B (en) Non-transitory computer accessible storage medium, method and computer systems for post-processing in a cloud-based data protection service
US8171063B1 (en) System and method for efficiently locating and processing data on a deduplication storage system
US10713361B2 (en) Anti-malware protection using volume filters
Carrier Risks of live digital forensic analysis
US9400886B1 (en) System and method for using snapshots for rootkit detection
US7831560B1 (en) Snapshot-aware secure delete
US8433863B1 (en) Hybrid method for incremental backup of structured and unstructured files
KR101201118B1 (en) System and method of aggregating the knowledge base of antivirus software applications
US7640404B2 (en) File system write filtering for selectively permitting or preventing data from being written to write-protected storage
US20100280996A1 (en) Transactional virtual disk with differential snapshots
US20090164738A1 (en) Process Based Cache-Write Through For Protected Storage In Embedded Devices
Fowler SQL server forenisc analysis
US7634521B1 (en) Technique for scanning stealthed, locked, and encrypted files
US20060277183A1 (en) System and method for neutralizing locked pestware files
Hirano et al. LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments
US9152823B2 (en) Systems, methods, and computer readable media for computer data protection
Hsu et al. Data concealments with high privacy in new technology file system
Ma et al. Travelling the hypervisor and ssd: A tag-based approach against crypto ransomware with fine-grained data recovery
US10303556B1 (en) Modifiable volume snapshots
Berghel et al. Data hiding tactics for windows and unix file systems
US8452744B2 (en) System and method for analyzing locked files
US9053108B2 (en) File system extended attribute support in an operating system with restricted extended attributes
Zhang et al. Virtual-machine-based intrusion detection on file-aware block level storage
Freiling et al. Characterizing loss of digital evidence due to abstraction layers
Mankin et al. Dione: a flexible disk monitoring and analysis framework