Book ChapterDOI
StegFS: A Steganographic File System for Linux
Andrew D. McDonald,Markus G. Kuhn +1 more
- pp 462-477
TLDR
The standard Linux file system (Ext2fs) is extended with a plausible-deniability encryption function and the design of the freely available implementation of this steganographic file system is described and its security and performance characteristics are described.Abstract:
Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release decryption keys for stored data once the presence of encrypted data on an inspected computer has been established We are interested in how cryptographic file systems can be extended to provide additional protection for such a scenario and we have extended the standard Linux file system (Ext2fs) with a plausible-deniability encryption function Even though it is obvious that our computer has harddisk encryption software installed and might contain some encrypted data, an inspector will not be able to determine whether we have revealed the access keys to all security levels or only those to a few selected ones We describe the design of our freely available implementation of this steganographic file system and discuss its security and performance characteristicsread more
Citations
More filters
Book
Security Engineering: A Guide to Building Dependable Distributed Systems
TL;DR: In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables.
Book
Steganography in Digital Media: Principles, Algorithms, and Applications
TL;DR: This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of Steganography.
Proceedings ArticleDOI
“A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology
Diana Freed,Jackeline Palmer,Diana Elizabeth Minchala,Karen Levy,Thomas Ristenpart,Nicola Dell +5 more
TL;DR: It is shown how the sociotechnical and relational factors that characterize IPV make such attacks both extremely damaging to victims and challenging to counteract, in part because they undermine the predominant threat models under which systems have been designed.
Journal ArticleDOI
Steganography-The Art of Hiding Data
TL;DR: The advantages and disadvantages, as well as, strengths and weaknesses in the use of steganography are explained.
Book
Forensic discovery
Dan Farmer,Wietse Venema +1 more
TL;DR: Digital forensics from a unique perspective because it examines the systems that create digital evidence in addition to the techniques used to find it, and introduces a powerful approach that can often recover evidence considered lost forever.
References
More filters
Book
The Design of the UNIX Operating System
TL;DR: This document discusses the representation of processes in the distributed UNIX system, and some of the mechanisms used to achieve this representation are described.
Proceedings ArticleDOI
A cryptographic file system for UNIX
TL;DR: Encryption techniques for file system-level encryption are described, and general issues of cryptographic system interfaces to support routine secure computing are discussed.
Book ChapterDOI
The steganographic file system
TL;DR: Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported an element of plausible deniability.
Proceedings Article
Software generation of practically strong random numbers
TL;DR: The performance of the generator on a variety of systems is analysed, and measures which can make recovery of the accumulator/generator state information more difficult for an attacker are presented.
Cryptography and evidence
TL;DR: This dissertation is an enquiry into the fundamental limitations of this application of cryptography, and the disadvantages of the techniques which are currently in use, and considers the converse problem, of ensuring that an instance of communication between computer systems leaves behind no unequivocal evidence of its having taken place.