Secure deletion of data from magnetic and solid-state memory

  • Authors:
  • Peter Gutmann

  • Affiliations:
  • Department of Computer Science, University of Auckland

  • Venue:
  • SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

With the use of increasingly sophisticated encryption systems, an attacker wishing to gain access to sensitive data is forced to look elsewhere for information. One avenue of attack is the recovery of supposedly erased data from magnetic media or random-access memory. This paper covers some of the methods available to recover erased data and presents schemes to make this recovery significantly more difficult.