ShieldFS: The Last Word in Ransomware Resilient File Systems
Preventive and reactive security measures can only partially mitigate the damage caused by modern ransomware attacks. The remarkable amount of illicit profit and the cybercriminals' increasing interest in ransomware schemes demonstrate that current defense solutions are failing, and a large number of users are actually paying the ransoms. In fact, pure-detection approaches (e.g., based on analysis sandboxes or pipelines) are not sufficient, because, when luck allows a sample to be isolated and analyzed, it is already too late for several users!
By Alessandro Barenghi, Alessandro Guagnelli, Andrea Continella, Federico Maggi, Giovanni Zingaro, Giulio De Pasquale, & Stefano Zanero
Full Abstract & Presentation Materials: https://www.blackhat.com/us-17/briefings.html#shieldfs-the-last-word-in-ransomware-resilient-file-systems
Видео ShieldFS: The Last Word in Ransomware Resilient File Systems канала Black Hat
By Alessandro Barenghi, Alessandro Guagnelli, Andrea Continella, Federico Maggi, Giovanni Zingaro, Giulio De Pasquale, & Stefano Zanero
Full Abstract & Presentation Materials: https://www.blackhat.com/us-17/briefings.html#shieldfs-the-last-word-in-ransomware-resilient-file-systems
Видео ShieldFS: The Last Word in Ransomware Resilient File Systems канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![How Smartcard Payment Systems Fail](https://i.ytimg.com/vi/ET0MFkRorbo/default.jpg)
![Lies and Damn Lies: Getting Past the Hype of Endpoint Security Solutions](https://i.ytimg.com/vi/3p_7hYXxkXE/default.jpg)
![GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs](https://i.ytimg.com/vi/_eSAF_qT_FY/default.jpg)
![ITWeb Events: Jayson Street at the Security Summit 2017](https://i.ytimg.com/vi/4MqLw5pN7Yw/default.jpg)
![DEF CON 22 Blinding The Surveillance State](https://i.ytimg.com/vi/xCH_q-xn760/default.jpg)
![Owning a Building: Exploiting Access Control and Facility Management Systems by Billy Rios](https://i.ytimg.com/vi/wvO3puWSGgQ/default.jpg)
![Black Hat Locksmithing (SHA2017)](https://i.ytimg.com/vi/WCO7dv6uMKo/default.jpg)
![](https://i.ytimg.com/vi/jaHc5IwyIrU/default.jpg)
![James Lyne - Cyber Crime and the Modern Sophistication of Cyber Criminals](https://i.ytimg.com/vi/QSCoFVnzwBg/default.jpg)
![SirenJack: Cracking a 'Secure' Emergency Warning Siren System](https://i.ytimg.com/vi/49KoUmiJuts/default.jpg)
![DEFCON 20: The Art Of The Con](https://i.ytimg.com/vi/4K6FXe5XcHs/default.jpg)
![How to Hack a Car: Phreaked Out (Episode 2)](https://i.ytimg.com/vi/3jstaBeXgAs/default.jpg)
![Bluetooth: With Low Energy Comes Low Security](https://i.ytimg.com/vi/Mo-FsEmaqpo/default.jpg)
![The Machines That Betrayed Their Masters by Glenn Wilkinson](https://i.ytimg.com/vi/GvrB6S_O0BE/default.jpg)
![The NSA Playset: A Year Of Toys And Tools](https://i.ytimg.com/vi/AdeMX6l9qNc/default.jpg)
![What's on the Wireless? Automating RF Signal Identification](https://i.ytimg.com/vi/XNcGhnY_0oI/default.jpg)
![Simple Spyware: Androids Invisible Foreground Services and How to (Ab)use Them](https://i.ytimg.com/vi/EuInUW77CPo/default.jpg)
![The kernel report](https://i.ytimg.com/vi/yt29BKVfI0I/default.jpg)
![DEFCON 16: Advanced Physical Attacks: Going Beyond Social Engineering and Dumpster Diving](https://i.ytimg.com/vi/fC8WMbIV2rQ/default.jpg)
![Preventing the IoT Dystopia with Copyleft](https://i.ytimg.com/vi/m1o42faNg8k/default.jpg)