About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings

Research Article

Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-25538-0_23,
        author={Wen Xie and Niusen Chen and Bo Chen},
        title={Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks},
        proceedings={Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
        proceedings_a={SECURECOMM},
        year={2023},
        month={2},
        keywords={Mobile device Data recovery OS-level malware Corruption point FTL TrustZone Version control},
        doi={10.1007/978-3-031-25538-0_23}
    }
    
  • Wen Xie
    Niusen Chen
    Bo Chen
    Year: 2023
    Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-031-25538-0_23
Wen Xie1, Niusen Chen1, Bo Chen1,*
  • 1: Department of Computer Science
*Contact email: bchen@mtu.edu

Abstract

Mobile computing devices today suffer from various malware attacks. After the malware attack, it is challenging to restore the device’s data back to the exact state right before the attack happens. This challenge would be exacerbated if the malware can compromise the OS of the victim device, obtaining the root privilege. In this work, we aim to design a novel data recovery framework for mobile computing devices, which can ensure recoverability of user data at the corruption point against the strong OS-level malware. By leveraging the version control capability of the cloud server and the hardware features of the local mobile device, we have successfully built MobiDR, the first system which can ensure restoration of data at the corruption point against the malware attacks. Our security analysis and experimental evaluation on the real-world implementation have justified the security and the practicality of MobiDR.

Keywords
Mobile device Data recovery OS-level malware Corruption point FTL TrustZone Version control
Published
2023-02-04
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-25538-0_23
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL