Show simple item record

dc.contributor.authorAsaduzzaman, Abu
dc.contributor.authorMridh, Muhammad F.
dc.contributor.authorUddin, M. Nizam
dc.date.accessioned2014-01-13T15:39:34Z
dc.date.available2014-01-13T15:39:34Z
dc.date.issued2013
dc.identifier.citationAsaduzzaman, Abu; Mridh, Muhammad F.; Uddin, M. Nizam. 2013. An Inexpensive plug-and-play hardware security module to restore systems from malware attacks. 2013 International Conference on Informatics, Electronics and Vision (ICIEV), pp. 1-5, 17-18 May 2013en_US
dc.identifier.isbn978-1-4799-0397-9
dc.identifier.otherWOS:000326546900041
dc.identifier.urihttp://dx.doi.org/10.1109/ICIEV.2013.6572565
dc.identifier.urihttp://hdl.handle.net/10057/6977
dc.descriptionClick on the DOI link to access the article (may not be free).en_US
dc.description.abstractDespite the booming of cloud computing, people will be using PCs for various good reasons including connecting to the cloud server. According to a 2009 report, more than two million people in every month have had their computer affected by malware, etc. although about 95% people use antivirus software. Recent studies warn that two most terrifying facts regarding malware attacks are (i) attacks intensified by 68% in year 2011 than in year 2010 and (ii) targets shifted towards end-point systems. However, 'there is no legal solution to malware'. Current software-based solution (like anti-virus software) to secure a system from malware attacks or restore a system after attacks is expensive and becomes obsolete very quickly. Contemporary state-of-the-art hardware security modules (HSMs) are not adequate to protect and restore end-user's computer systems from malware attacks in a hassle-free cost-effective way. In this work, we propose an USB memory based solution to restore a full system including operating system (OS), application software, and data files, if needed due to malware attacks. Proposed easy-steps solution is suitable for most systems (old or new), most OSs (Windows or Linux), and all users (novice or moderate or advanced level). Based on our preliminary experience, we are convinced that the proposed system recovery solution is feasible. In fact, proposed user friendly solution has potential to save big money and reduce distress for most users.en_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.ispartofseriesInformatics, Electronics & Vision (ICIEV);2013 International Conference on Informatics, Electronics and Vision (ICIEV)
dc.subject'Decrypt' image disken_US
dc.subject'Encrypt' primary disken_US
dc.subjectHardware security moduleen_US
dc.subjectRestoring systemsen_US
dc.subjectMalware attacksen_US
dc.titleAn Inexpensive plug-and-play hardware security module to restore systems from malware attacksen_US
dc.typeArticleen_US


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record