• Login
    View Item 
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical Engineering and Computer Science
    • EECS Faculty Scholarship
    • EECS Research Publications
    • View Item
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical Engineering and Computer Science
    • EECS Faculty Scholarship
    • EECS Research Publications
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    An Inexpensive plug-and-play hardware security module to restore systems from malware attacks

    Date
    2013
    Author
    Asaduzzaman, Abu
    Mridh, Muhammad F.
    Uddin, M. Nizam
    Metadata
    Show full item record
    Citation
    Asaduzzaman, Abu; Mridh, Muhammad F.; Uddin, M. Nizam. 2013. An Inexpensive plug-and-play hardware security module to restore systems from malware attacks. 2013 International Conference on Informatics, Electronics and Vision (ICIEV), pp. 1-5, 17-18 May 2013
    Abstract
    Despite the booming of cloud computing, people will be using PCs for various good reasons including connecting to the cloud server. According to a 2009 report, more than two million people in every month have had their computer affected by malware, etc. although about 95% people use antivirus software. Recent studies warn that two most terrifying facts regarding malware attacks are (i) attacks intensified by 68% in year 2011 than in year 2010 and (ii) targets shifted towards end-point systems. However, 'there is no legal solution to malware'. Current software-based solution (like anti-virus software) to secure a system from malware attacks or restore a system after attacks is expensive and becomes obsolete very quickly. Contemporary state-of-the-art hardware security modules (HSMs) are not adequate to protect and restore end-user's computer systems from malware attacks in a hassle-free cost-effective way. In this work, we propose an USB memory based solution to restore a full system including operating system (OS), application software, and data files, if needed due to malware attacks. Proposed easy-steps solution is suitable for most systems (old or new), most OSs (Windows or Linux), and all users (novice or moderate or advanced level). Based on our preliminary experience, we are convinced that the proposed system recovery solution is feasible. In fact, proposed user friendly solution has potential to save big money and reduce distress for most users.
    Description
    Click on the DOI link to access the article (may not be free).
    URI
    http://dx.doi.org/10.1109/ICIEV.2013.6572565
    http://hdl.handle.net/10057/6977
    Collections
    • EECS Research Publications

    Browse

    All of Shocker Open Access RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace software copyright © 2002-2021  DuraSpace
    Contact Us | Send Feedback
    DSpace Express is a service operated by 
    Atmire NV