scispace - formally typeset
Book ChapterDOI

StegFS: A Steganographic File System for Linux

TLDR
The standard Linux file system (Ext2fs) is extended with a plausible-deniability encryption function and the design of the freely available implementation of this steganographic file system is described and its security and performance characteristics are described.
Abstract
Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release decryption keys for stored data once the presence of encrypted data on an inspected computer has been established We are interested in how cryptographic file systems can be extended to provide additional protection for such a scenario and we have extended the standard Linux file system (Ext2fs) with a plausible-deniability encryption function Even though it is obvious that our computer has harddisk encryption software installed and might contain some encrypted data, an inspector will not be able to determine whether we have revealed the access keys to all security levels or only those to a few selected ones We describe the design of our freely available implementation of this steganographic file system and discuss its security and performance characteristics

read more

Citations
More filters
Book

Security Engineering: A Guide to Building Dependable Distributed Systems

TL;DR: In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables.
Book

Steganography in Digital Media: Principles, Algorithms, and Applications

TL;DR: This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of Steganography.
Proceedings ArticleDOI

“A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology

TL;DR: It is shown how the sociotechnical and relational factors that characterize IPV make such attacks both extremely damaging to victims and challenging to counteract, in part because they undermine the predominant threat models under which systems have been designed.
Journal ArticleDOI

Steganography-The Art of Hiding Data

TL;DR: The advantages and disadvantages, as well as, strengths and weaknesses in the use of steganography are explained.
Book

Forensic discovery

Dan Farmer, +1 more
TL;DR: Digital forensics from a unique perspective because it examines the systems that create digital evidence in addition to the techniques used to find it, and introduces a powerful approach that can often recover evidence considered lost forever.
References
More filters
Book

The Design of the UNIX Operating System

TL;DR: This document discusses the representation of processes in the distributed UNIX system, and some of the mechanisms used to achieve this representation are described.
Proceedings ArticleDOI

A cryptographic file system for UNIX

TL;DR: Encryption techniques for file system-level encryption are described, and general issues of cryptographic system interfaces to support routine secure computing are discussed.
Book ChapterDOI

The steganographic file system

TL;DR: Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported an element of plausible deniability.
Proceedings Article

Software generation of practically strong random numbers

TL;DR: The performance of the generator on a variety of systems is analysed, and measures which can make recovery of the accumulator/generator state information more difficult for an attacker are presented.

Cryptography and evidence

Michael Roe
TL;DR: This dissertation is an enquiry into the fundamental limitations of this application of cryptography, and the disadvantages of the techniques which are currently in use, and considers the converse problem, of ensuring that an instance of communication between computer systems leaves behind no unequivocal evidence of its having taken place.