Reactive redundancy for data destruction protection (R2D2)
نویسندگان
چکیده
Data destruction programs, such as Wiper Malware, cause substantial damage by overwriting critical digital assets on compromised machines, denying users access to computing resources. Our system, called R2D2, analyzes write buffers before they can reach a storage medium, determines if the write is destructive, and preserves the data under destruction. We interpose the inspection in the Virtual Machine Monitor (VMM) through a technique known as Virtual Machine Introspection (VMI). This has the benefit that it does not rely on the entire OS as a root of trust. We demonstrate the effectiveness of our prototype implementation by preserving data targeted for destruction by Wiper Malware such as Shamoon and Stonedrill, and a host of secure delete tools. We discover that R2D2 detects data destruction with high accuracy (99.8% true negative and true positive rates) and preserves critical data for all the Wiper Malware samples in the wild that we experimented with. While our prototype is not optimized for performance, we show that it is applicable for common user tasks in an office or home setting, with a latency increase of 1%–4% and 9%–20% to complete batch tasks and interactive tasks respectively. VMI accounts for 90.7%–98.5% of the latency overhead and thus R2D2 incurs a small cost for environments already using VMI. © 2018 Elsevier Ltd. All rights reserved.
منابع مشابه
Role of rural women in operation, protection and restoration of natural resources in desert plains; Case study: Khuzestan province
Abstract Non-renewable natural resources play an important role in sustainable development of developing countries such as Iran. However, since the natural resources should be preserved for future generations, proper use of such resources seems mandatory. Women are one of the prime users of natural resources in developing countries. The purpose of this study is to assess the conservational be...
متن کاملDicer-2 and R2D2 coordinately bind siRNA to promote assembly of the siRISC complexes.
In Drosophila melanogaster, the Dicer-2/R2D2 complex initiates RNA interference (RNAi) by processing long double-stranded RNA (dsRNA) into small interfering RNA (siRNA). Recent biochemical studies suggest that the Dcr-2/R2D2 complex also facilitates incorporation of siRNA into the RNA-induced silencing complex (siRISC). Here we present genetic evidence that R2D2 and Dcr-2 are both required for ...
متن کاملR2D2: Rendezvous Regions for Data Discovery
In large-scale wireless networks such as mobile ad hoc and sensor networks, efficient and robust service discovery and data-access mechanisms are both essential and challenging. Rendezvous-based mechanisms provide a valuable solution for provisioning a wide range of services. In this paper, we describe R2D2 a novel scalable rendezvous-based architecture for wireless networks. R2D2 is a general ...
متن کاملDrosophila R2D2 mediates follicle formation in somatic tissues through interactions with Dicer-1
The miRNA pathway has been shown to regulate developmentally important genes. Dicer-1 is required to cleave endogenously encoded microRNA (miRNA) precursors into mature miRNAs that regulate endogenous gene expression. RNA interference (RNAi) is a gene silencing mechanism triggered by double-stranded RNA (dsRNA) that protects organisms from parasitic nucleic acids. In Drosophila, Dicer-2 cleaves...
متن کاملR2d2 Drives Selfish Sweeps in the House Mouse.
A selective sweep is the result of strong positive selection driving newly occurring or standing genetic variants to fixation, and can dramatically alter the pattern and distribution of allelic diversity in a population. Population-level sequencing data have enabled discoveries of selective sweeps associated with genes involved in recent adaptations in many species. In contrast, much debate but...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 74 شماره
صفحات -
تاریخ انتشار 2018