{"id":"https://openalex.org/W3095533027","doi":"https://doi.org/10.1109/access.2020.3034443","title":"PhantomFS-v2: Dare You to Avoid This Trap","display_name":"PhantomFS-v2: Dare You to Avoid This Trap","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3095533027","doi":"https://doi.org/10.1109/access.2020.3034443","mag":"3095533027"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3034443","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3034443","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09241734.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09241734.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047188508","display_name":"Jione Choi","orcid":"https://orcid.org/0000-0002-1441-164X"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jione Choi","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048861263","display_name":"Hwiwon Lee","orcid":"https://orcid.org/0000-0002-6704-8901"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hwiwon Lee","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110822288","display_name":"Younggi Park","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Younggi Park","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091602017","display_name":"Huy Kang Kim","orcid":"https://orcid.org/0000-0002-0760-8807"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Huy Kang Kim","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100435070","display_name":"Jung\u00adhee Lee","orcid":"https://orcid.org/0000-0003-0733-0136"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Junghee Lee","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100458491","display_name":"Youngjae Kim","orcid":"https://orcid.org/0000-0001-8786-3850"},"institutions":[{"id":"https://openalex.org/I148751991","display_name":"Sogang University","ror":"https://ror.org/056tn4839","country_code":"KR","type":"education","lineage":["https://openalex.org/I148751991"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Youngjae Kim","raw_affiliation_strings":["Sogang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Sogang University, Seoul, South Korea","institution_ids":["https://openalex.org/I148751991"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101731582","display_name":"Gyuho Lee","orcid":"https://orcid.org/0000-0001-9842-5549"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gyuho Lee","raw_affiliation_strings":["Cyber Warfare Research and Development Laboratory, LIG Nex1, Seongnam, South Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Warfare Research and Development Laboratory, LIG Nex1, Seongnam, South Korea","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076200886","display_name":"Shinwoo Shim","orcid":"https://orcid.org/0000-0003-0959-9200"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shin-Woo Shim","raw_affiliation_strings":["Cyber Warfare Research and Development Laboratory, LIG Nex1, Seongnam, South Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Warfare Research and Development Laboratory, LIG Nex1, Seongnam, South Korea","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100741151","display_name":"Taekyu Kim","orcid":"https://orcid.org/0000-0003-1268-027X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Taekyu Kim","raw_affiliation_strings":["Cyber Warfare Research and Development Laboratory, LIG Nex1, Seongnam, South Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Warfare Research and Development Laboratory, LIG Nex1, Seongnam, South Korea","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5047188508"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.2898,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.82348596,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"8","issue":null,"first_page":"198285","last_page":"198300"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8308464288711548},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7413893938064575},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6952879428863525},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.6738303899765015},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.5033721327781677},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.48031824827194214},{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.4560846984386444},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4290095269680023},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4220598042011261},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4209233820438385},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10784253478050232},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10357636213302612}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8308464288711548},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7413893938064575},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6952879428863525},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.6738303899765015},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.5033721327781677},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.48031824827194214},{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.4560846984386444},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4290095269680023},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4220598042011261},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4209233820438385},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10784253478050232},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10357636213302612},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.3034443","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3034443","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09241734.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:821ab3c4e88f4bac9e0731e9a4e7a141","is_oa":true,"landing_page_url":"https://doaj.org/article/821ab3c4e88f4bac9e0731e9a4e7a141","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 198285-198300 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3034443","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3034443","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09241734.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321373","display_name":"Korea University","ror":"https://ror.org/047dqcg40"},{"id":"https://openalex.org/F4320324161","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3095533027.pdf","grobid_xml":"https://content.openalex.org/works/W3095533027.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W105015318","https://openalex.org/W136163439","https://openalex.org/W164984320","https://openalex.org/W201134067","https://openalex.org/W1536598138","https://openalex.org/W1552047811","https://openalex.org/W1648477960","https://openalex.org/W1999588868","https://openalex.org/W2041700825","https://openalex.org/W2072610876","https://openalex.org/W2086454935","https://openalex.org/W2086802441","https://openalex.org/W2090650780","https://openalex.org/W2093397575","https://openalex.org/W2093488494","https://openalex.org/W2098010707","https://openalex.org/W2101699859","https://openalex.org/W2102902405","https://openalex.org/W2105535383","https://openalex.org/W2106306039","https://openalex.org/W2114792143","https://openalex.org/W2130778370","https://openalex.org/W2147767253","https://openalex.org/W2156612354","https://openalex.org/W2161125296","https://openalex.org/W2167240430","https://openalex.org/W2213283130","https://openalex.org/W2539082945","https://openalex.org/W2605224218","https://openalex.org/W2794834625","https://openalex.org/W2797887368","https://openalex.org/W2887371428","https://openalex.org/W2962858319","https://openalex.org/W3006183682","https://openalex.org/W4299801659","https://openalex.org/W6633053796","https://openalex.org/W6719325137","https://openalex.org/W6750480621"],"related_works":["https://openalex.org/W1994712384","https://openalex.org/W4240186231","https://openalex.org/W2166844173","https://openalex.org/W3170525725","https://openalex.org/W3089468277","https://openalex.org/W4310805820","https://openalex.org/W2119580333","https://openalex.org/W3200236636","https://openalex.org/W1838401043","https://openalex.org/W2809416438"],"abstract_inverted_index":{"It":[0,52,201],"has":[1,81],"been":[2],"demonstrated":[3,204],"that":[4,84,173,205],"deception":[5,30,88,92],"technologies":[6],"are":[7,113],"effective":[8],"in":[9,72,103,210],"detecting":[10],"advanced":[11],"persistent":[12],"threats":[13],"and":[14,48,122,132,155,164,215],"zero-day":[15],"attacks":[16],"which":[17],"cannot":[18],"be":[19,65],"detected":[20,66],"by":[21,182],"traditional":[22],"signature-based":[23],"intrusion":[24],"detection":[25,156,190],"techniques.":[26,200],"Especially,":[27],"a":[28,76,82,91,134],"file-based":[29],"technology":[31,93],"is":[32,36,85,94,99,177,202,208],"promising":[33],"because":[34,60],"it":[35,98],"very":[37],"difficult":[38],"(if":[39],"not":[40],"impossible)":[41],"to":[42,75,87,96,101,118,137,145,198],"commit":[43],"an":[44,56,69],"attack":[45,130,140],"without":[46],"reading":[47],"modifying":[49],"any":[50],"file.":[51],"can":[53,64],"play":[54],"as":[55],"additional":[57],"security":[58,163],"barrier":[59],"malicious":[61],"file":[62,158],"access":[63,74],"even":[67],"if":[68],"adversary":[70],"succeeds":[71],"gaining":[73],"host.":[77],"However,":[78],"PhantomFS":[79,116,144,176,187],"still":[80],"problem":[83],"common":[86],"technologies.":[89],"Once":[90],"known":[95],"adversaries,":[97],"unlikely":[100],"succeed":[102],"alluring":[104],"adversaries.":[105],"In":[106],"this":[107],"paper,":[108],"we":[109,127,150],"classify":[110],"adversaries":[111,181],"who":[112],"aware":[114],"of":[115,124,157,167,212],"according":[117],"their":[119],"knowledge":[120],"level":[121],"permission":[123],"PhantomFS.":[125],"Then":[126],"analyze":[128],"the":[129,139,147,162,168,174,206],"surface":[131],"develop":[133],"defense":[135],"strategy":[136],"limit":[138],"vectors.":[141],"We":[142,160,171],"extend":[143],"realize":[146],"strategy.":[148],"Specifically,":[149],"introduce":[151],"multiple":[152],"hidden":[153],"interfaces":[154],"execution.":[159],"evaluate":[161],"performance":[165],"overhead":[166,207],"proposed":[169],"technique.":[170],"demonstrate":[172],"extended":[175,186],"secure":[178],"against":[179],"intelligent":[180],"penetration":[183],"testing.":[184],"The":[185],"offers":[188],"higher":[189],"accuracy":[191],"with":[192],"lower":[193],"false":[194],"alarm":[195],"rate":[196],"compared":[197],"existing":[199],"also":[203],"negligible":[209],"terms":[211],"response":[213],"time":[214],"CPU":[216],"time.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
