A case for redundant arrays of inexpensive disks (RAID)
SIGMOD '88 Proceedings of the 1988 ACM SIGMOD international conference on Management of data
The design and implementation of a log-structured file system
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
All-or-Nothing Encryption and the Package Transform
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Elephant: The File System that Never Forgets
HOTOS '99 Proceedings of the The Seventh Workshop on Hot Topics in Operating Systems
Remembrance of Data Passed: A Study of Disk Sanitization Practices
IEEE Security and Privacy
Cryptanalysis a Study of Ciphers and Their Solutions
Cryptanalysis a Study of Ciphers and Their Solutions
Mapping Structures for Flash Memories: Techniques and Open Problems
SWSTE '05 Proceedings of the IEEE International Conference on Software - Science, Technology & Engineering
Ext3cow: a time-shifting file system for regulatory compliance
ACM Transactions on Storage (TOS)
Data lifetime is a systems problem
Proceedings of the 11th workshop on ACM SIGOPS European workshop
A natural language approach to automated cryptanalysis of two-time pads
Proceedings of the 13th ACM conference on Computer and communications security
eCryptfs: a stacked cryptographic filesystem
Linux Journal
On efficient wear leveling for large-scale flash-memory storage systems
Proceedings of the 2007 ACM symposium on Applied computing
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Understanding data lifetime via whole system simulation
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Shredding your garbage: reducing data lifetime through secure deallocation
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Data security issues relating to end of life equipment
ISEE '04 Proceedings of the International Symposium on Electronics and the Environment
A flash-memory based file system
TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings
Metadata update performance in file systems
OSDI '94 Proceedings of the 1st USENIX conference on Operating Systems Design and Implementation
Crypt analysis of two time pads in case of compressed speech
Computers and Electrical Engineering
TrueErase: per-file secure deletion for the storage data path
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |
Confidential data storage through encryption is becoming increasingly important. Designers and implementers of encryption methods of storage media must be aware that storage has different usage patterns and properties compared to securing other information media such as networks. In this paper, we empirically demonstrate two-time pad vulnerabilities in storage that are exposed via shifting file contents, in-place file updates, storage mechanisms hidden by layers of abstractions, inconsistencies between memory and disk content, and backups. We also demonstrate how a simple application of Bloom filters can automatically extract plaintexts from two-time pads. Further, our experience sheds light on system research directions to better support cryptographic assumptions and guarantees.