Encryption ransomware has become a notorious malware. It encrypts user data on storage devices like solid-state drives (SSDs) and demands a ransom to restore data for users. To bypass existing defenses, ransomware would keep evolving and performing new attack models. For instance, we identify and validate three new attacks, including (1) garbage-collection (GC) attack that exploits storage capacity and keeps writing data to trigger GC and force SSDs to release the retained data; (2) timing attack that intentionally slows down the pace of encrypting data and hides its I/O patterns to escape existing defense; (3) trimming attack that utilizes the trim command available in SSDs to physically erase data. To enhance the robustness of SSDs against these attacks, we propose RSSD, a ransomware-aware SSD. It redesigns the flash management of SSDs for enabling the hardware-assisted logging, which can conservatively retain older versions of user data and received storage operations in time order with low overhead. It also employs hardware-isolated NVMe over Ethernet to expand local storage capacity by transparently offloading the logs to remote cloud/servers in a secure manner. RSSD enables post-attack analysis by building a trusted evidence chain of storage operations to assist the investigation of ransomware attacks. We develop RSSD with a real-world SSD FPGA board. Our evaluation shows that RSSD can defend against new and future ransomware attacks, while introducing negligible performance overhead.
翻译:加密赎金软件已成为臭名昭著的恶意软件。 它加密了储存设备, 如固态驱动器(SSDs) 的用户数据, 并要求为用户恢复数据。 为了绕过现有的防御, 赎金软件将不断演化和采用新的攻击模式。 例如, 我们确定并验证了三起新的袭击, 包括:(1) 垃圾收集(GC) 袭击, 利用存储能力, 并不断撰写数据, 以触发GC, 迫使 SSDs发布保留的数据; (2) 时间攻击, 故意降低加密数据的速度, 并隐藏其I/ O模式, 以逃避现有的防御; (3) 减少袭击, 利用SSDs中现有的修饰指令来实际删除数据。 为了增强SDSDs袭击的稳健性, 我们建议SDSDD(一个意识到赎金的系统)系统。 它重新设计了SD的闪光管理, 使硬件辅助的伐木作业能够保守地保留旧版的用户数据, 并及时接收存储业务。 它还在Ethernet上使用硬件隔离的NPM Me, 来扩大当地储存能力, 将存储数据用于透明的存储服务器的存储能力, 运行后, 通过透明地的SRSM(SD) 测试, 建立一个稳定的存储服务器的SD(SD), 建立一个稳定的存储器的运行一个稳定的存储器的运行, 以透明地分析。