Movatterモバイル変換


[0]ホーム

URL:


CN119918052A - Method for counteracting encryption ransomware attack, solid state drive, electronic device and storage medium - Google Patents

Method for counteracting encryption ransomware attack, solid state drive, electronic device and storage medium
Download PDF

Info

Publication number
CN119918052A
CN119918052ACN202510396727.4ACN202510396727ACN119918052ACN 119918052 ACN119918052 ACN 119918052ACN 202510396727 ACN202510396727 ACN 202510396727ACN 119918052 ACN119918052 ACN 119918052A
Authority
CN
China
Prior art keywords
vat
lux
ssd
host
time point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202510396727.4A
Other languages
Chinese (zh)
Other versions
CN119918052B (en
Inventor
程建平
顾维嘉
沈昌祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Xingchen Shuchuang Technology Co ltd
Original Assignee
Chengdu Xingchen Shuchuang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Xingchen Shuchuang Technology Co ltdfiledCriticalChengdu Xingchen Shuchuang Technology Co ltd
Priority to CN202510396727.4ApriorityCriticalpatent/CN119918052B/en
Publication of CN119918052ApublicationCriticalpatent/CN119918052A/en
Application grantedgrantedCritical
Publication of CN119918052BpublicationCriticalpatent/CN119918052B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Landscapes

Abstract

The invention discloses a method for resisting encryption lux attack, a solid state disk, an electronic device and a storage medium, which relate to the technical field of data storage and data security and comprise the steps of adding a special flash memory conversion layer for managing the mapping relation between a logic address and a physical address to be recovered in an SSD and continuing to use a conventional flash memory conversion layer for managing the mapping relation between the logic address and the physical address, arranging a real-time clock chip in the SSD to generate an RTC time stamp of the physical address and responding to an operation command from a host based on the special flash memory conversion layer, the conventional flash memory conversion layer and the real-time clock, providing a set of countermeasure strategy and implementation technical scheme on SSD hardware to support the production of high-security SSD device, which can recognize and defend all encryption lux attacks in advance, and simultaneously prevent other computer virus infection and illegal tampering programs by internal privileges of users, thereby extremely protecting the data stored in the SSD and the security of executable programs.

Description

Method for resisting encryption lux attack, solid state disk, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data storage and data security technologies, and more particularly, to a method for combating encryption lux attacks, a solid state disk, an electronic device, and a storage medium.
Background
The encryption lux attack, also called encryption lux virus, is a special malicious software, which encrypts the user file by using various encryption algorithms and requires the victim to pay ransom to obtain the decryption key. The attack based on cryptography is extremely harmful, and a plurality of malignant cases occur on the global scale, so that huge economic losses and even social order confusion are caused.
Currently, for defending against encryption lux attacks, most are based on dynamic detection techniques of file activity, but such dynamic behavior detection techniques have hysteresis, which results in that part of the file is encrypted before identification. And based on the file activity detection of the operating system kernel, it is difficult to resist encryption luxury attacks with administrator privileges.
The protection of the hardware level is realized by utilizing the hardware characteristics of the SSD, and the importance of researchers is gradually drawn. The solid state disk is naturally provided with a page changing updating mechanism, encrypted data generated by encryption lux attack is written into a new idle physical page, and original data is used as a physical page to be recovered and is still in good existence in a short period. This makes it possible to restore the original data. However, how to accurately detect the encryption lux attack in early stages under the limited computational power condition in the SSD becomes a very serious challenge.
Currently, under the technical condition of the existing computer, the data storage device and the storage system which are comprehensively and generally used for defending encryption lux attack are high in manufacturing difficulty and high in cost. However, in the application fields of trusted data resources and data assets, the common feature of the data is that once the data is generated, it is permanently unchanged (e.g. monthly financial report of enterprise, transaction credentials, government personnel files). In particular, such data is mostly related to economic activities, which, once destroyed by the encrypted lux virus, directly cause the enterprise to run out. In view of the actual need for secure storage of such data, there is a need for a dedicated storage device that resists encryption lux attacks, pre-discovers, and prevents illegal overwriting of data.
Disclosure of Invention
The invention aims to provide a method for resisting encryption lux attacks and a solid state disk SSD for directional use, and provides a complete set of resisting strategies and an implementation technical scheme on SSD hardware aiming at the basic property of unchanged data static state and the characteristics of the encryption lux attacks in the fields of trusted data resources and data assets so as to support the production of high-safety SSD equipment, and the SSD equipment can effectively identify and defend various encryption lux attacks and protect data safety.
The above object of the present invention is achieved by the following technical solutions:
In a first aspect, the present application provides a method for combating cryptographic lux attacks, comprising the specific steps of:
adding a special flash memory conversion layer VAT for managing the mapping relation between the logical address and the physical address to be recovered in the SSD;
A conventional flash translation layer FTL for managing a mapping relationship between a logical address and a physical address is used in an SSD;
A real-time clock chip RTC is arranged in the SSD and is used for generating an RTC time stamp of a physical address and generating an abnormal time point queue TQ;
based on the special flash translation layer VAT, the normal flash translation layer FTL, and the real time clock RTC, operating commands from a host are responded, including write commands, read commands, and rollback commands.
On the basis of the technical scheme, the invention can be improved as follows.
Further, the special flash translation layer VAT includes a VAT bitmap and a VAT mapping table, where the VAT bitmap is used to record a working state of each logical address, and the VAT mapping table is used to record a physical address to be recovered corresponding to each logical address, and when the physical address to be recovered does not exist, it is also used to record an RTC timestamp of the physical address corresponding to the logical address in the conventional flash translation layer FTL.
Further, the responding to the write command from the host specifically includes:
Acquiring the working state of a VAT bitmap peer-to-peer logical address according to the logical address of the write command, if the working state is an occupied state, calculating and storing the attack rate AR of the encryption lux attack, then executing the idle operation, and returning the write success to the host, wherein the attack rate AR is the accumulated number of times of the encryption lux attack within N seconds, and N > =1;
if the working state is an idle state, executing conventional write operation by using the conventional flash memory translation layer FTL, then recording an RTC time stamp of the write operation in an entry of a peer-to-peer logical address in a VAT mapping table, updating the working state of the peer-to-peer logical address in the VAT bitmap to be an occupied state, and returning successful write to a host.
Further, the responding to the read command from the host specifically includes:
acquiring the working state of the VAT bitmap peer-to-peer logical address according to the logical address of the read command, if the working state is an occupied state, executing conventional read operation by using the conventional flash memory translation layer FTL, and returning successful read to a host;
if the working state is an idle state and the current RTC time exceeds the first time point in the abnormal time point queue TQ and the exceeding time reaches more than one hour, pushing the current RTC time into the abnormal time point queue TQ, wherein the abnormal time point queue TQ is a first-in first-out queue;
If the working state is an idle state and the current attack rate AR value is greater than or equal to a threshold value, generating an alarm signal, simultaneously executing conventional reading operation by using the conventional flash memory conversion layer FTL, and returning successful reading to a host.
Further, the responding to the rollback command from the host specifically includes:
Judging whether the time point exceeds the limit according to the designated time point of the rollback command or the time point in the abnormal time point queue TQ, if the time point exceeds the limit, returning rollback failure to the host, otherwise, acquiring each table item falling into the time point range from the VAT mapping table and the conventional flash translation layer FTL, exchanging the table item content of the VAT mapping table with the peer table item content in the conventional flash translation layer FTL one by one, and updating the VAT bitmap according to the exchanged table item content in the conventional flash translation layer FTL, namely, if the table item content is the RTC time stamp, updating the VAT bitmap into an idle state, simultaneously updating the PBA of the peer logic address in the FTL into a failure, otherwise, updating the VAT bitmap into an occupied state, simultaneously updating the PBA of the peer logic address in the FTL into a valid state, and returning rollback to the host successfully.
In a second aspect, the present application provides a solid state disk, which uses the method for combating encryption lux attack in any one of the first aspects to protect against encryption lux virus and protect data in the solid state disk from being rewritten by the virus.
In a third aspect, the present application provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing protection against encrypted lux virus and protection against data in the electronic device from virus by using the method of any one of the first aspects when executing the computer program.
In a fourth aspect, the present application provides a non-transitory computer readable storage medium storing computer instructions that, when executed by a computer, implement protection against encrypted lux virus, and protect data in the computer from being overwritten by the virus, using the method of any one of the first aspects.
Compared with the prior art, the invention has at least the following beneficial effects:
In the application, the RTC time stamp is generated by utilizing the real-time clock chip arranged in the SSD, and the encryption lux attack can be automatically detected and alarm can be given out based on the write command, the read command and the rollback command of the special flash memory conversion layer VAT and the conventional flash memory conversion layer FTL, so that the damage of all encryption lux viruses can be prevented in advance, other computer virus infection and illegal tampering of executable programs by privileged can be prevented, and the data and the executable programs stored in the SSD are approximately extremely protected. The method can protect program codes, key parameters and business rules from being changed arbitrarily by human beings, thus supporting an unmanned trusted application system, can meet basic accounting rules (namely, inhibit post-modification and adding hedging records in error correction) and permanently unchanged data when being used for storing data resources or data assets (such as account books, transaction contracts or vouchers, title certificates and the like), can convert common data into high-quality and high-value data meeting 'judicial credibility', and can strictly limit the data manipulation rights of system privilege personnel and eliminate data security threats (such as preventing theft, camera bellows operation and the like) from personnel in a user.
Drawings
The accompanying drawings, which are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the principles of the application. In the drawings:
FIG. 1 is a schematic diagram of a special flash translation layer and a conventional flash translation layer according to an embodiment of the present invention;
FIG. 2 is a schematic diagram illustrating a write command flow according to an embodiment of the invention;
FIG. 3 is a flow chart of a read command according to an embodiment of the invention;
FIG. 4 is a schematic diagram illustrating a flow of a rollback command according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a solid state disk device in an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that like reference numerals and letters refer to like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
In the description of the embodiments of the present invention, "plurality" means at least 2.
Embodiment 1. The present embodiment provides a method for combating encrypted lux attacks, comprising the following specific steps:
s1, adding a special flash memory conversion layer VAT for managing the mapping relation between a logical address and a physical address to be recovered in an SSD;
S11, a conventional flash translation layer FTL for managing the mapping relation between the logical address and the physical address is used in the SSD;
s12, a real-time clock chip RTC is arranged in an SSD and used for generating an RTC time stamp of a physical address and generating an abnormal time point queue TQ;
The FTL (conventional flash translation layer) is core metadata of a conventional SSD (solid state disk), and a main controller of the SSD relies on the FTL to manage a large number of NAND memory units of the FTL. In order to resist the encryption lux attack, however, new functions need to be added, in order to keep the conventional work task of the FTL basically unchanged without increasing the complexity of the FTL, a layer of special FTL can be added, which is called a VAT (special flash memory conversion layer), and the VAT also works under the control of an SSD main control CPU and mainly bears the work task of resisting the encryption lux attack.
Optionally, the special flash memory conversion layer VAT includes a VAT bitmap and a VAT mapping table, where the VAT bitmap is used to record a working state of each logical address, and the VAT mapping table is used to record a physical address to be recovered corresponding to each logical address, and when the physical address to be recovered does not exist, it is also used to record an RTC timestamp of a physical address corresponding to the logical address in the FTL.
The VAT mapping table is a mapping table with special functions and is used for recording physical addresses to be recovered, wherein the physical addresses to be recovered are generated by the characteristic of page change update of SSD, and original data of logical addresses are temporarily stored. This is to take advantage of the features of SSD "page-change update" to achieve data "rollback" to eliminate corruption by viruses. When the physical address to be recovered does not exist, the VAT mapping table is used for recording the RTC time stamp of the PBA corresponding to the logical address in the FTL, the VAT bitmap stores the working states of all the logical addresses of the SSD, and once the logical addresses are used, the initial values are updated to be occupied. The VAT bitmap is positioned in the SSD, the encrypted Lesovirus cannot access, and the entry for the attack of the virus can be divided into two types, namely, the direct attack on the storage device is realized through the bottom drive of the host, the current working state of the target address cannot be known, the unreasonable reading and writing behaviors are inevitably generated, and the attack is started through the file system of the host OS, and the attack is subjected to the powerful blocking described in the next step.
S2, responding to an operation command from a host based on the special flash memory conversion layer VAT, the conventional flash memory conversion layer FTL and the real-time clock RTC, wherein the operation command comprises a write command, a read command and a rollback command.
The RTC (real time clock) is a hardware integrated circuit chip, and is used for generating an internal time of the SSD, wherein the internal time of the SSD can be a self-timer system or can be synchronous with an actual time (such as Beijing time), and when host data is written into the PBA, the current RTC time is used as a time stamp of the PBA.
Optionally, the foregoing response to the write command from the host, as shown in fig. 2, specifically is:
S21, the working state of the equivalent logic address of the VAT bitmap is obtained according to the logic address of the writing command, if the working state is the occupied state, the attack rate AR of the encryption lux attack is calculated and stored, then the idle operation is executed, and writing success is returned to the host, if the working state is the idle state, the normal writing operation is executed by using the normal flash memory conversion layer FTL, then the RTC time stamp of the writing operation is recorded in the table entry of the equivalent logic address in the VAT mapping table, and meanwhile, the working state of the equivalent logic address in the VAT bitmap is updated to the occupied state, and writing success is returned to the host.
The main objective of the encryption lux attack is that the data (the data file or the executable program seen in the host OS layer) already exist in the SSD, so that powerful blocking measures are taken here, namely, the encryption lux virus cannot cause 'fatal' damage to the user data by prohibiting the overwriting of any existing data in the logical address space of the SSD, further, in order to prevent the encryption lux or other viruses from adopting a 'depletion storage' tactic (such as creating a large amount of stealth garbage files), the user host is maliciously blocked, and the RTC time stamp of the 'write' operation is saved by using the VAT mapping table, so that the rollback command expanded by the invention is adopted when needed, the damage caused by the virus is eliminated, and the encryption lux person cannot achieve the purpose of saving money and cannot cause any damage to the data in the SSD by the two steps.
Optionally, the responding to the read command from the host, as shown in fig. 3, specifically includes:
S22, acquiring the working state of the VAT bitmap equivalent logic address according to the logic address of the read command, if the working state is the occupied state, executing conventional read operation by using the conventional flash memory conversion layer FTL, and returning successful read to the host;
if the working state is an idle state and the current RTC time exceeds the first time point of the abnormal time point queue TQ and the exceeding time reaches more than one hour, pushing the current RTC time into the abnormal time point queue TQ, wherein the abnormal time point queue TQ is a first-in first-out queue (FIFO);
If the working state is an idle state and the current attack rate AR value is greater than or equal to a threshold value, generating an alarm signal, executing conventional reading operation by using the conventional flash memory conversion layer FTL, and returning successful reading to the host.
When an encryption lux attack occurs, the target data of the encryption lux attack needs to be read out for encryption, if the logic address of the target data is in an occupied state, the SSD main control CPU cannot find an exception, but if the logic address is in an idle state, the exception is obvious, because few application programs read undefined data (some OS are unusual in functions and exception of a disk tool program, but in the SSD application occasion of the invention, a user (an operator) knows the operation influence of the SSD, and the exception is just a good way). At the moment, the SSD main control CPU combines the AR value to judge that the encryption lux attack is happening, and the flash lamp is used for alarming.
The abnormal time point queue TQ is configured to record a time list in which the encryption lux is detected, for use when executing the rollback command.
Optionally, the responding to the rollback command from the host, as shown in fig. 4, specifically includes:
S23, judging whether the time point exceeds the limit according to the appointed time point of the rollback command or the time point in the abnormal time point queue TQ, if the time point exceeds the limit, returning a rollback failure to the host, otherwise, acquiring each table item falling into the time point range from the VAT mapping table and the normal flash translation layer FTL, exchanging the table item content of the VAT mapping table and the peer table item content in the normal flash translation layer FTL one by one, and updating the VAT bitmap according to the table item content in the normal flash translation layer FTL after the exchange, namely, updating the VAT bitmap into an idle state and updating the PBA of the peer logic address in the FTL into a failure state if the table item content is the RTC time stamp, otherwise, updating the VAT bitmap into an occupied state and updating the PBA of the peer logic address in the FTL into a valid state, and finally returning the rollback success to the host.
The rollback command is a professional maintenance tool of the SSD, is operable to be executed within a limited time after a virus attack occurs and is used for eliminating junk data generated by the virus, and the time point range of the rollback command refers to a time span (for example, 12 hours) from the moment to a past certain time point.
Example 2 the object of this example is to support the production of an SSD device that is resistant to encryption lux attacks, as shown in FIG. 5, comprising three components, a bottom plate portion, a main controller portion, and a NAND memory array portion, wherein:
the bottom plate part is a PCB circuit board and carries an encryption Leuch attack ALARM lamp ALARM, a main controller, a NAND array and other necessary auxiliary electronic components;
The main controller comprises a CPU, an OTP (one-time programmable memory), DRAM, RTC, VAT bitmaps, a VAT mapping table and an FTL (flash memory conversion layer), wherein the CPU is responsible for total scheduling, utilizes metadata provided by the VAT and the FTL to complete various calculation processing tasks, the OTP is solidified to save the key parameters of the SSD and algorithms of various work tasks, the DRAM provides a cache required by the CPU when in operation, the RTC is a hardware real-time clock chip and is used for generating the local time of the SSD, the SSD can be self-made into a timing system or can be synchronous with the actual time (such as Beijing time), when user data is written into the PBA, a specific RTC value is used as a time stamp of the PBA, the FTL is core metadata of a conventional SSD, and the management tasks of translation conversion of the physical address of the SSD of a host logic address vs, the PBA page allocation, waste block recovery, bad block replacement, wear balance and the like are completed under the scheduling of the CPU.
Specifically, the VAT includes a VAT bitmap and a VAT mapping table.
The VAT bitmap is an added data structure of the invention, which stores the working state of all the logic addresses accessible by the SSD host, the initial value is idle, and the VAT bitmap is updated to be occupied once the logic addresses are used.
FTL, VAT mapping table and VAT bitmap, keep in the reserved memory space in the NAND array when static, when the power on SSD is initialized, call into the DRAM or SRAM high-speed dynamic memory on the motherboard. The size of the addressing spaces of the FTL, the VAT mapping table and the VAT bitmap are the same, and the addressing spaces are all logical address LBA spaces of the SSD.
The NAND memory array is a storage medium of the SSD, and a part of the storage space is reserved for storing metadata of the SSD or is used as a bad block backup, another part of the storage space can be allocated, and is used as a physical address PBA for storing data of a host, and obviously, the PBA addressing space is larger than the LBA.
Further, the ALARM lamp is used for sending out an ALARM flash when the CPU detects the suspected encrypted Lexovirus attack, but the ALARM flash does not indicate that the virus attack has caused data destruction, but only reminds a user of noticing that the suspected virus attack is happening. In fact, the stored data of the SSD of this embodiment cannot be destroyed online by the encrypted Lesovirus or other virus (unless the NAND medium is removed in the field).
Optionally, fig. 1 shows a two-layer FTL architecture of the present invention, and the system design concept of layered processing is applied, so that each layer of processing task is clear, the operation is simple, the inter-layer intersection is reduced as much as possible, and the SSD device is more robust. The first layer VAT (special flash memory conversion layer) of the embodiment comprises a VAT bitmap and a VAT mapping table, the VAT bitmap is an extremely important part of the invention, the characteristics of the current working state of the SSD logical address are difficult to learn by using the encrypted Lexovirus, the blind attack of the VAT is inevitably unreasonable operation of accessing undefined data, so that a CPU finds that the attack exists, the characteristics that viruses are inevitably required to rewrite the existing data are used for strong line, and the trace of the VAT is seized again. Of course, in other embodiments, a mode of temporarily transferring the target PBA data of the virus can also be adopted, and then the user uses the rollback command of the present invention to make the attack fall.
Further, the flow chart of writing data, reading data and rolling back data in this embodiment is shown in fig. 2, 3 and 4, and the conventional SSD also supports full disc reset, delete command and erase command, which are obviously not applicable to the SSD product of the invention, and the implementer has to remove these commands. It should be clear that this embodiment introduces a "rollback" command implemented in the SSD and sets an operational time limit for this command that, on the one hand, avoids the disaster of intentionally unintentionally or maliciously rolling back all data (nor does the waste block reclamation mechanism of the SSD allow too long rollbacks), and, on the other hand, this limit characterizes the "chronological" sealing of trusted data resources or data assets. (dating means periodically compiling data at a fixed time and prohibiting later modifications, such as monthly financial reports for the enterprise). It can be seen that the real time clock RTC in this embodiment is an essential important component.
The design of this embodiment is intended to protect normal user files or programs, but also user data assets or data resources (which are characterized by data that once generated is permanently unchangeable), but this embodiment does not contain a "drop disc encryption" function and cannot be used to save any security level files, and this embodiment supports the implementer to add a drop disc encryption function or component to the host controller, if desired. The embodiment does not support partition protection (or no protection) on the storage space of the SSD, so that the complexity is prevented from generating loopholes, and the data security is ensured.
Embodiment 3. The embodiment of the application provides a solid state disk, which realizes the protection of encryption lux and the protection of data security by the method for resisting encryption lux attack in any one of the first aspect.
The embodiment of the application also provides electronic equipment, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor uses any one of the methods in the first aspect to realize defending encryption luxury and protecting data security when executing the computer program.
The embodiment of the application also provides a non-transitory computer readable storage medium, the non-transitory computer readable storage medium stores computer instructions, and the computer executes the instructions by using the method of any one of the first aspects to realize defending encryption luxury and protecting data security.
The foregoing description of the embodiments has been provided for the purpose of illustrating the general principles of the invention, and is not meant to limit the scope of the invention, but to limit the invention to the particular embodiments, and any modifications, equivalents, improvements, etc. that fall within the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (8)

Judging whether the time point exceeds the limit according to the designated time point of the rollback command or the time point in the abnormal time point queue TQ, if the time point exceeds the limit, returning rollback failure to the host, otherwise, acquiring each table item falling into the time point range from the VAT mapping table and the conventional flash translation layer FTL, exchanging the table item content of the VAT mapping table with the peer table item content in the conventional flash translation layer FTL one by one, and updating the VAT bitmap according to the exchanged table item content in the conventional flash translation layer FTL, namely, if the table item content is the RTC time stamp, updating the VAT bitmap into an idle state, simultaneously updating the PBA of the peer logic address in the FTL into a failure, otherwise, updating the VAT bitmap into an occupied state, simultaneously updating the PBA of the peer logic address in the FTL into a valid state, and returning rollback to the host successfully.
CN202510396727.4A2025-04-012025-04-01Method for resisting encryption lux attack, solid state disk, electronic equipment and storage mediumActiveCN119918052B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202510396727.4ACN119918052B (en)2025-04-012025-04-01Method for resisting encryption lux attack, solid state disk, electronic equipment and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202510396727.4ACN119918052B (en)2025-04-012025-04-01Method for resisting encryption lux attack, solid state disk, electronic equipment and storage medium

Publications (2)

Publication NumberPublication Date
CN119918052Atrue CN119918052A (en)2025-05-02
CN119918052B CN119918052B (en)2025-07-01

Family

ID=95510656

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202510396727.4AActiveCN119918052B (en)2025-04-012025-04-01Method for resisting encryption lux attack, solid state disk, electronic equipment and storage medium

Country Status (1)

CountryLink
CN (1)CN119918052B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20210011845A1 (en)*2019-07-102021-01-14Board Of Trustees Of The University Of IllinoisCapturing time-varying storage of data in memory device for data recovery purposes
US20210216478A1 (en)*2019-11-222021-07-15Pure Storage, Inc.Logical Address Based Authorization of Operations with Respect to a Storage System
CN117457039A (en)*2023-12-152024-01-26成都星辰数创科技有限公司Flash memory chip capable of not changing data, solid state disk SSD and control method thereof
US20240037233A1 (en)*2022-07-292024-02-01Samsung Electronics Co., Ltd.Ransomware and malicious software protection in ssd/ufs by nvme instructions log analysis based on machine-learning
US20240330462A1 (en)*2023-03-312024-10-03Samsung Electronics Co., Ltd.Storage device performing data recovery in multi-tenancy environment and operation method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20210011845A1 (en)*2019-07-102021-01-14Board Of Trustees Of The University Of IllinoisCapturing time-varying storage of data in memory device for data recovery purposes
US20210216478A1 (en)*2019-11-222021-07-15Pure Storage, Inc.Logical Address Based Authorization of Operations with Respect to a Storage System
US20240037233A1 (en)*2022-07-292024-02-01Samsung Electronics Co., Ltd.Ransomware and malicious software protection in ssd/ufs by nvme instructions log analysis based on machine-learning
US20240330462A1 (en)*2023-03-312024-10-03Samsung Electronics Co., Ltd.Storage device performing data recovery in multi-tenancy environment and operation method thereof
CN117457039A (en)*2023-12-152024-01-26成都星辰数创科技有限公司Flash memory chip capable of not changing data, solid state disk SSD and control method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JIAN HUANG ET.AL: "FlashGuard_ Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware", 《ACM CCS 2017》, 3 November 2017 (2017-11-03), pages 1 - 14*

Also Published As

Publication numberPublication date
CN119918052B (en)2025-07-01

Similar Documents

PublicationPublication DateTitle
Min et al.Amoeba: An autonomous backup and recovery SSD for ransomware attack defense
US11966385B2 (en)Database transaction log writing and integrity checking
US8074281B2 (en)Malware detection with taint tracking
WO2018100520A1 (en)Protection system and method for protecting a computer system against ransomware attacks
US12254090B2 (en)Filesystem object protection from ransomware attacks
US20190095285A1 (en)Backup and recovery of data files using hard links
KR101828600B1 (en)Context-aware ransomware detection
US9881154B2 (en)Hardware-assisted log protection devices and systems
US12124595B2 (en)Detecting unauthorized encryptions in data storage systems
US11949710B2 (en)System and method for efficient early indication of ransomware attack for damage prevention and control
Chen et al.{PEARL}: Plausibly deniable flash translation layer using {WOM} coding
CN107045605A (en)A kind of real-time metrics method and device
Ma et al.Travelling the hypervisor and ssd: A tag-based approach against crypto ransomware with fine-grained data recovery
US11386219B2 (en)Detection of an unauthorized modification to storage and restoration of the storage
WO2007091237A2 (en)Long term backup on disk
US11960606B2 (en)System and method for protecting against data storage attacks
CN119918052B (en)Method for resisting encryption lux attack, solid state disk, electronic equipment and storage medium
Sha et al.Object-oriented unified encrypted memory management for heterogeneous memory architectures
CN112131615B (en)Data storage mechanism supporting supervision
CN114265832A (en)Multifunctional database maintenance management system
US20250156545A1 (en)A cyber-attack detection and prevention system
KR102106689B1 (en)Data availability ssd architecture for providing user data protection
JP2006195992A (en)File usage storage method and computer-readable storage medium
Lee et al.Hardware-assisted intrusion detection by preserving reference information integrity
WO2024235435A1 (en)Distributed catalog controller and method for data leakage prevention using distributed catalog

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
EE01Entry into force of recordation of patent licensing contract
EE01Entry into force of recordation of patent licensing contract

Application publication date:20250502

Assignee:Sichuan Lingfeng Heyue Technology Co.,Ltd.

Assignor:Chengdu Xingchen Shuchuang Technology Co.,Ltd.

Contract record no.:X2025980016663

Denomination of invention:Methods for combating encrypted ransomware attackssolid state driveselectronic devices and storage media

Granted publication date:20250701

License type:Common License

Record date:20250808


[8]ページ先頭

©2009-2025 Movatter.jp