• Corpus ID: 2268843

Mapping the File Systems Genome: rationales, technique, results and applications

@article{Pietro2013MappingTF,
  title={Mapping the File Systems Genome: rationales, technique, results and applications},
  author={Roberto Di Pietro and Luigi V. Mancini and Antonio Villani and Domenico Vitali},
  journal={ArXiv},
  year={2013},
  volume={abs/1306.2833}
}
This paper provides evidence of a feature of Hard-Disk Drives (HDDs), that we call File System Genome. Such a feature is originated by the areas where (on the HDD) the file blocks are placed by the operating system during the installation procedure. It appears from our study that the File System Genome is a distinctive and unique feature of each indi- vidual HDD. In particular, our extensive set of experiments shows that the installation of the same operating system on two identical hardware… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 18 REFERENCES

Understanding the Linux Kernel, Second Edition

Understanding the Linux Kernel, Second Edition will acquaint you with all the inner workings of Linux, but is more than just an academic exercise.

Understanding the Linux Kernel

This edition of Understanding the Linux Kernel covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices.

Physical-Layer Identification of Wired Ethernet Devices

It is shown that some models of cards can be reidentified even after a month has elapsed since they were last seen, and an adaptive thresholding strategy employing prediction intervals is used to cope with the stochastic nature of the signals.

How Unique Is Your Web Browser?

  • P. Eckersley
  • Computer Science
    Privacy Enhancing Technologies
  • 2010
The degree to which modern web browsers are subject to "device fingerprinting" via the version and configuration information that they will transmit to websites upon request is investigated, and what countermeasures may be appropriate to prevent it is discussed.

Intrinsic and Extrinsic Signatures for Information Hiding and Secure Printing with Electrophotographic Devices

By using the same strategies employed earlier to reduce the banding artifacts, the effort to identify intrinsic printer signatures for a number of electrophotographic printers that are now on the market is described.

Signature-embedding in printed documents for security and forensic applications

It is shown that the banding artifact in the EP print process can be viewed as an intrinsic feature of the printer used to identify both the model and make of the device.

DDoS Detection with Information Theory Metrics and Netflows - A Real Case

This comparison considers the ability of each metric to detect (D)DoS attacks at an early stage, in order to launch effective and timely countermeasures, based on a large dataset collected from an Italian transit tier II Autonomous System (AS) located in Rome.

Application of Principal Components Analysis and Gaussian Mixture Models to Printer Identification

Different classification algorithms to identify an unknown printer are described and intrinsic feature extraction method, based on frequency domain analysis of the one dimensional projected signal, is described.

Accelerometers and randomness: perfect together

This paper develops a thorough experimental adversarial model for accelerometers that supply a system with entropy and demonstrates the validity of accelerometer based random number generation on an RFID tag, which is a highly resource constrained device.

Secure Digital Camera

The proposed concept will provide forensic investigators with a tool that will help them establish the integrity of a digital camera image presented to the court and prove that it is a true and accurate representation of reality.