skip to main content
10.1145/2991079.2991110acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

ShieldFS: a self-healing, ransomware-aware filesystem

Published:05 December 2016Publication History

ABSTRACT

Preventive and reactive security measures can only partially mitigate the damage caused by modern ransomware attacks. Indeed, the remarkable amount of illicit profit and the cyber-criminals' increasing interest in ransomware schemes suggest that a fair number of users are actually paying the ransoms.

Unfortunately, pure-detection approaches (e.g., based on analysis sandboxes or pipelines) are not sufficient nowadays, because often we do not have the luxury of being able to isolate a sample to analyze, and when this happens it is already too late for several users! We believe that a forward-looking solution is to equip modern operating systems with practical self-healing capabilities against this serious threat. Towards such a vision, we propose ShieldFS, an add-on driver that makes the Windows native filesystem immune to ransomware attacks. For each running process, ShieldFS dynamically toggles a protection layer that acts as a copy-on-write mechanism, according to the outcome of its detection component. Internally, ShieldFS monitors the low-level filesystem activity to update a set of adaptive models that profile the system activity over time. Whenever one or more processes violate these models, their operations are deemed malicious and the side effects on the filesystem are transparently rolled back.

We designed ShieldFS after an analysis of billions of low-level, I/O filesystem requests generated by thousands of benign applications, which we collected from clean machines in use by real users for about one month. This is the first measurement on the filesystem activity of a large set of benign applications in real working conditions.

We evaluated ShieldFS in real-world working conditions on real, personal machines, against samples from state of the art ransomware families. ShieldFS was able to detect the malicious activity at runtime and transparently recover all the original files. Although the models can be tuned to fit various filesystem usage profiles, our results show that our initial tuning yields high accuracy even on unseen samples and variants.

References

  1. Nicoló Andronio, Stefano Zanero, and Federico Maggi. "HelDroid: Dissecting and Detecting Mobile Ransomware." In: Research in Attacks, Intrusions, and Defenses. Springer, 2015, pp. 382--404. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Liviu Arsene and Alexandra Gheorghe. Ransomware. A Victim's Perspective. Tech. rep. Bitdefender, 2016. url: http://www.bitdefender.com/media/materials/white-papers/en/Bitdefender_Ransomware_A_Victim_Perspective.pdf.Google ScholarGoogle Scholar
  3. FBI. Criminals Continue to Defraud and Extort Funds from Victims Using CryptoWall Ransomware Schemes. 2015. url: http://www.ic3.gov/media/2015/150623.aspx.Google ScholarGoogle Scholar
  4. Shay Gueron. Intel Advanced Encryption Standard (AES) New Instructions Set. Tech. rep. Intel, 2012. url: https://software.intel.com/sites/default/files/article/165683/aes-wp-2012-09-22-v01.pdf.Google ScholarGoogle Scholar
  5. Microsoft Inc. File System Minifilter Drivers. 2014. url: https://msdn.microsoft.com/en-us/library/windows/hardware/ff540402(v=vs.85).aspx.Google ScholarGoogle Scholar
  6. Amin Kharaz et al. "UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware." In: 25th USENIX Security Symposium (USENIX Security 16). Austin, TX: USENIX Association, 2016, pp. 757--772. isbn: 978-1-931971-32-4.Google ScholarGoogle Scholar
  7. Amin Kharraz et al. "Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks." In: Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9--10, 2015, Proceedings. Vol. 9148. Springer. 2015, p. 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Vadim Kotov and Mantej Singh Rajpal. Understanding Crypto-Ransomware: In-Depth Analysis of the Most Popular Malware Families. Tech. rep. Bromium, 2014.Google ScholarGoogle Scholar
  9. Andrea Lanzi et al. "AccessMiner: using system-centric models for malware protection." In: Proceedings of the 17th ACM conference on Computer and communications security. ACM. 2010, pp. 399--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Pierre Lestringant, Frédéric Guihéry, and Pierre-Alain Fouque. "Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism." In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. ACM. 2015, pp. 203--214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Trend Micro. Ransomware Bill Seeks to Curb the Extortion Malware Epidemic. 2016. url: http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-bill-curb-the-extortion-malware-epidemic.Google ScholarGoogle Scholar
  12. Christian Rossow et al."Prudent practices for designing malware experiments: Status quo and outlook." In: Security and Privacy (SP), 2012 IEEE Symposium on. IEEE. 2012, pp. 65--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Kevin Savage, Peter Coogan, and Hon Lau. The evolution of ransomware. Tech. rep. Symantec, 2015.Google ScholarGoogle Scholar
  14. Nolen Scaife et al. "CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data." In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). IEEE. 2016.Google ScholarGoogle Scholar
  15. Michele Spagnuolo, Federico Maggi, and Stefano Zanero. "Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3--7, 2014, Revised Selected Papers." In: ed. by Nicolas Christin and Reihaneh Safavi-Naini. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. Chap. BitIodine: Extracting Intelligence from the Bit-coin Network, pp. 457--468. isbn: 978-3-662-45472-5.Google ScholarGoogle Scholar
  16. Unlock the key to repel ransomware. Tech. rep. Kasper-sky Lab, 2015.Google ScholarGoogle Scholar
  17. Video demonstration of ShieldFS in action. url: https://www.youtube.com/watch?v=0UlgdnQQaLM.Google ScholarGoogle Scholar
  18. David Wagner and Paolo Soto. "Mimicry attacks on host-based intrusion detection systems." In: Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM. 2002, pp. 255--264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Tobias Wüchner, Martín Ochoa, and Alexander Pretschner. "Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics." In: Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 2015, pp. 98--118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Adam Young and Moti Yung."Cryptovirology: Extortion-based security threats and countermeasures." In: Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on. IEEE. 1996, pp. 129--140. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications
    December 2016
    614 pages
    ISBN:9781450347716
    DOI:10.1145/2991079

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 5 December 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate104of497submissions,21%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader