An Inexpensive plug-and-play hardware security module to restore systems from malware attacks

No Thumbnail Available
Authors
Asaduzzaman, Abu
Mridh, Muhammad F.
Uddin, M. Nizam
Advisors
Issue Date
2013
Type
Article
Keywords
'Decrypt' image disk , 'Encrypt' primary disk , Hardware security module , Restoring systems , Malware attacks
Research Projects
Organizational Units
Journal Issue
Citation
Asaduzzaman, Abu; Mridh, Muhammad F.; Uddin, M. Nizam. 2013. An Inexpensive plug-and-play hardware security module to restore systems from malware attacks. 2013 International Conference on Informatics, Electronics and Vision (ICIEV), pp. 1-5, 17-18 May 2013
Abstract

Despite the booming of cloud computing, people will be using PCs for various good reasons including connecting to the cloud server. According to a 2009 report, more than two million people in every month have had their computer affected by malware, etc. although about 95% people use antivirus software. Recent studies warn that two most terrifying facts regarding malware attacks are (i) attacks intensified by 68% in year 2011 than in year 2010 and (ii) targets shifted towards end-point systems. However, 'there is no legal solution to malware'. Current software-based solution (like anti-virus software) to secure a system from malware attacks or restore a system after attacks is expensive and becomes obsolete very quickly. Contemporary state-of-the-art hardware security modules (HSMs) are not adequate to protect and restore end-user's computer systems from malware attacks in a hassle-free cost-effective way. In this work, we propose an USB memory based solution to restore a full system including operating system (OS), application software, and data files, if needed due to malware attacks. Proposed easy-steps solution is suitable for most systems (old or new), most OSs (Windows or Linux), and all users (novice or moderate or advanced level). Based on our preliminary experience, we are convinced that the proposed system recovery solution is feasible. In fact, proposed user friendly solution has potential to save big money and reduce distress for most users.

Table of Contents
Description
Click on the DOI link to access the article (may not be free).
Publisher
IEEE
Journal
Book Title
Series
Informatics, Electronics & Vision (ICIEV);2013 International Conference on Informatics, Electronics and Vision (ICIEV)
PubMed ID
DOI
ISSN
EISSN