Toward a secure system engineering methodolgy
Proceedings of the 1998 workshop on New security paradigms
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis
IEEE Transactions on Computers
A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations
JavaCard '00 Revised Papers from the First International Workshop on Java on Smart Cards: Programming and Security
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Journal of Systems Architecture: the EUROMICRO Journal
Remembrance of Data Passed: A Study of Disk Sanitization Practices
IEEE Security and Privacy
On the performance, feasibility, and use of forward-secure signatures
Proceedings of the 10th ACM conference on Computer and communications security
Memories: A Survey of Their Secure Uses in Smart Cards
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
Ext3cow: a time-shifting file system for regulatory compliance
ACM Transactions on Storage (TOS)
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
Fossilized index: the linchpin of trustworthy non-alterable electronic records
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Semantically-Smart Disk Systems
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
New approaches for deniable authentication
Proceedings of the 12th ACM conference on Computer and communications security
Security of erasable memories against adaptive adversaries
Proceedings of the 2005 ACM workshop on Storage security and survivability
Data lifetime is a systems problem
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Building regulatory compliant storage systems
dg.o '06 Proceedings of the 2006 international conference on Digital government research
Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools
IEEE Security and Privacy
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
Secure deletion myths, issues, and solutions
Proceedings of the second ACM workshop on Storage security and survivability
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
Threats to privacy in the forensic analysis of database systems
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
On the implementation of the advanced encryption standard on a public-key crypto-coprocessor
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Database-aware semantically-smart storage
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
An open-source cryptographic coprocessor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Secure data deletion for Linux file systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Scrash: a system for generating secure crash information
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Understanding data lifetime via whole system simulation
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Shredding your garbage: reducing data lifetime through secure deallocation
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Software generation of practically strong random numbers
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Secure data deletion for Linux file systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
The packet vault: secure storage of network data
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Controlled physical random functions and applications
ACM Transactions on Information and System Security (TISSEC)
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Recovering data from USB flash memory sticks that have been damaged or electronically erased
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Secure deletion for NAND flash file system
Proceedings of the 2008 ACM symposium on Applied computing
Towards tamper-evident storage on patterned media
FAST'08 Proceedings of the 6th USENIX Conference on File and Storage Technologies
Practical techniques for purging deleted data using liveness information
ACM SIGOPS Operating Systems Review - Research and developments in the Linux kernel
FPGA Intrinsic PUFs and Their Use for IP Protection
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
BootJacker: compromising computers using forced restarts
Proceedings of the 15th ACM conference on Computer and communications security
Overwriting Hard Drive Data: The Great Wiping Controversy
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Lest we remember: cold boot attacks on encryption keys
SS'08 Proceedings of the 17th conference on Security symposium
A new approach to secure logging
ACM Transactions on Storage (TOS)
Lest we remember: cold-boot attacks on encryption keys
Communications of the ACM - Security in the Browser
Data Deletion with Provable Security
Information Security Applications
International Journal of Electronic Security and Digital Forensics
Smart card applications and security
Information Security Tech. Report
Security constructs for regulatory-compliant storage
Communications of the ACM - Amir Pnueli: Ahead of His Time
A survey of confidential data storage and deletion methods
ACM Computing Surveys (CSUR)
Fully automated and hidden system for wiping sensitive data
ECC'10 Proceedings of the 4th conference on European computing conference
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Data wiping system with fully automated, hidden and remote destruction capabilities
WSEAS Transactions on Computers
Keeping data secret under full compromise using porter devices
Proceedings of the 26th Annual Computer Security Applications Conference
Forenscope: a framework for live forensics
Proceedings of the 26th Annual Computer Security Applications Conference
Reliably erasing data from flash-based solid state drives
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
Semantically-smart disk systems
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
Digital forensics on a virtual machine
Proceedings of the 49th Annual Southeast Regional Conference
Automated construction of a false digital alibi
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Accusation resolution using security metrology
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
SWIPE: eager erasure of sensitive data in large scale systems software
Proceedings of the second ACM conference on Data and Application Security and Privacy
A tutorial on physical security and side-channel attacks
Foundations of Security Analysis and Design III
Data remanence in flash memory devices
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
One big file is not enough: a critical evaluation of the dominant free-space sanitization technique
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Personal computer privacy: analysis for korean PC users
IWSEC'06 Proceedings of the 1st international conference on Security
The persistence of memory: Forensic identification and extraction of cryptographic keys
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Genodroid: are privacy-preserving genomic tests ready for prime time?
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Eternal sunshine of the spotless machine: protecting privacy with ephemeral channels
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
File and memory security analysis for grid systems
HPCC'07 Proceedings of the Third international conference on High Performance Computing and Communications
Secure data deletion from persistent media
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
The impact of the antivirus on the digital evidence
International Journal of Electronic Security and Digital Forensics
Memory efficient sanitization of a deduplicated storage system
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
Hi-index | 0.00 |
With the use of increasingly sophisticated encryption systems, an attacker wishing to gain access to sensitive data is forced to look elsewhere for information. One avenue of attack is the recovery of supposedly erased data from magnetic media or random-access memory. This paper covers some of the methods available to recover erased data and presents schemes to make this recovery significantly more difficult.