Hiding Malware On Distributed Storage

被引:0
|
作者
Moubarak, Joanna [1 ]
Chamoun, Maroun [1 ]
Filiol, Eric [2 ]
机构
[1] USJ, Fac Engn, Beirut, Lebanon
[2] ESIEA, C V Lab, Laval, France
来源
2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT) | 2019年
关键词
Malware; Blockchain; Distributed storage; Swarm; IPFS; Ethereum;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Blockchain technology has been one of the major innovations in recent years. Crypto-currencies and decentralized applications are increasingly adopted. Their principles led the foundation for new ideas underlying others distributed ledger technologies (DLTs). In particular, decentralized storage employs non-recursive functions and similar algorithms compared to the Blockchain technology. Furthermore, digital signatures procedures have been used for storage validation. This paper summarizes IPFS and Swarm technologies and exposes how we managed to hide our malware on distributed storage. Our demonstration's results illustrate the possibility to hide malicious content by segregating it and reveal that decentralized storages have many concerns and lack security verification procedures.
引用
收藏
页码:720 / 725
页数:6
相关论文
共 50 条
  • [21] Auditing for Distributed Storage Systems
    Le, Anh
    Markopoulou, Athina
    Dimakis, Alexandros G.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (04) : 2182 - 2195
  • [22] Capacity of Clustered Distributed Storage
    Sohn, Jy-Yong
    Choi, Beongjun
    Yoon, Sung Whan
    Moon, Jaekyun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (01) : 81 - 107
  • [23] Specification of a distributed storage system
    Nankman, MA
    Nieuwenhuis, LJM
    COMPUTER COMMUNICATIONS, 1996, 19 (01) : 30 - 38
  • [24] Secure distributed storage and retrieval
    Garay, JA
    Gennaro, R
    Jutla, C
    Rabin, T
    THEORETICAL COMPUTER SCIENCE, 2000, 243 (1-2) : 363 - 389
  • [25] Distributed medical data storage model based on blockchain technology
    Duan, Changyu
    Jiang, Rong
    Zhang, Yi
    Wu, Bin
    Li, Fengliang
    Duan, Yu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4757 - 4777
  • [26] Securing Fingerprint Template Using Blockchain and Distributed Storage System
    Acquah, Moses Arhinful
    Chen, Na
    Pan, Jeng-Shyang
    Yang, Hong-Mei
    Yan, Bin
    SYMMETRY-BASEL, 2020, 12 (06):
  • [27] Attempt to Utilize Surplus Storage Capacity as Distributed Storage
    Kawato, Toshiya
    Higashino, Masayuki
    Takahashi, Kenichi
    Kawamura, Takao
    2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, : 351 - 355
  • [28] Detecting Malware Code as Video With Compressed, Time-Distributed Neural Networks
    Santacroce, Michael L.
    Koranek, Daniel
    Jha, Rashmi
    IEEE ACCESS, 2020, 8 : 132748 - 132760
  • [29] Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT)
    Min, Byungho
    Varadharajan, Vijay
    2015 20TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2015, : 80 - 89
  • [30] Service Reliability and Availability Analysis of Distributed Software Systems Considering Malware Attack
    Xiong, Cheng-Jie
    Li, Yan-Fu
    Xie, Min
    Ng, Szu-Hui
    Goh, Thong-Ngee
    ADVANCES IN SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 59 : 313 - 320