Secure deletion of data from magnetic and solid-state memory
@inproceedings{Gutmann1996SecureDO, title={Secure deletion of data from magnetic and solid-state memory}, author={Peter C. Gutmann}, year={1996} }
With the use of increasingly sophisticated encryption systems, an attacker wishing to gain access to sensitive data is forced to look elsewhere for information. One avenue of attack is the recovery of supposedly erased data from magnetic media or random-access memory. This paper covers some of the methods available to recover erased data and presents schemes to make this recovery significantly more difficult.
466 Citations
Encrypting Virtual Memory
- Computer ScienceUSENIX Security Symposium
- 2000
The solution described in this paper uses swap encryption for processes in possession of confidential data that has been implemented for the UVM virtual memory system and its performance is acceptable.
On Secure Data Deletion
- Computer ScienceIEEE Secur. Priv.
- 2014
Approaches to securely delete digital data are explored, different adversaries' capabilities are described, and how secure deletion approaches can be integrated into systems at different interface levels to protect against specific adversaries are shown.
Disposal of Disk and Tape Data by Secure Sanitization
- Computer ScienceIEEE Security & Privacy
- 2009
Recent disk drives with internal full disk encryption now implement an enhanced secure-erase command that takes only milliseconds to complete, according to federal guideline NIST 800-88.
Eraser: Your Data Won't Be Back
- Computer Science2018 IEEE European Symposium on Security and Privacy (EuroS&P)
- 2018
This work presents a technique to provide secure deletion guarantees at file granularity, independent of the characteristics of the underlying storage medium, and describes an implementation of this scheme as a fileaware stackable block device deployed as a standalone Linux kernel module that does not require modifications to the operating system.
Data Deletion with Provable Security
- Computer ScienceWISA
- 2008
This paper presents a new approach to data storage for which a provably secure data deletion seems to be possible and provides rigid mathematical analysis of security of the proposed scheme for some scenarios even in the presence of an extremely powerful adversary.
The Packet Vault: Secure Storage of Network Data
- Computer ScienceWorkshop on Intrusion Detection and Network Monitoring
- 1999
The packet vault is described, a cryptographically secured archiver of network packet data that captures network packets, encrypts them, and writes them to long-term CD-ROM storage for later analysis and for evidentiary purposes.
Deniable File System--Application of Deniable Storage to Protection of Private Keys
- Computer Science6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)
- 2007
This article discusses various ideas of deniable file systems, their advantages, drawbacks and use as a storage for sensitive data (e.g. private keys for the asymmetric algorithms). Also a design of…
A survey of confidential data storage and deletion methods
- Computer ScienceCSUR
- 2010
This survey summarizes and compares existing methods of providing confidential storage and deletion of data in personal computing environments.
Challenges and Designs for Secure Deletion in Storage Systems
- Computer Science2020 Indo – Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN)
- 2020
This paper surveys the state-of-the-art secure deletion techniques that have been designed to pursue higher efficiency, verifiability, and portability for emerging types of hard disk drives and flash-based solid-state drives.
A framework for password harvesting from volatile memory
- Computer ScienceInt. J. Electron. Secur. Digit. Forensics
- 2012
The presence of confidential data in RAM such as user passwords is investigated and it is shown that even if the computer is switched off but not removed from the mains, the data are preserved.
References
SHOWING 1-10 OF 30 REFERENCES
The changing nature of disk controllers
- Computer ScienceProc. IEEE
- 1993
The evolution of the disk controllers that interface disk drive storage devices and subsystems with their hosts is reviewed, showing the nature of the controller and its functions has undergone a significant change.
Emergency Destruction of Information Storing Media
- Computer Science
- 1987
This IDA Report provides a basis for analyzing the appropriateness of various destruction technologies in the emergency destruction of information storing media, and leads to a research plan for developing specific destruction techniques, equipment, and procedures.
Magnetic force scanning tunneling microscope imaging of overwritten data
- Physics1992. Digests of Intermag. International Magnetics Conference
- 1992
The MFSTM (magnetic force scanning tunneling microscopy) technique is shown to be a powerful technique for generating images of magnetization patterns. Images of the overwritten data on commercial…
Relationship between overwrite and transition shift in perpendicular magnetic recording
- Geology
- 1994
The overwrite characteristics in perpendicular magnetic recording is discussed based on the transition shift. The transition shift during the write process caused by the interference in the vicinity…
Microscopic investigations of overwritten data
- Physics
- 1993
The magnetic field distributions of overwritten patterns on rigid thin film disk media have been imaged with submicron resolution by using the magnetic force scanning tunneling microscope. The…
Effects of current and frequency on write, read, and erase widths for thin-film inductive and magnetoresistive heads
- Physics
- 1989
The dependence of write, read, and erase widths on current and frequency for thin-film inductive (TFI) and inductive-write/magnetoresistive-read (MR) heads was studied. Currents of up to 150 mA and…
Time-dependent magnetic phenomena and particle-size effects in recording media
- Materials Science
- 1990
Particle size is very important in determining the behavior of magnetic recording media. Particles must be large enough to provide adequate stability against time-dependent magnetic effects; these…
Overwrite temperature dependence for magnetic recording
- Geology
- 1988
The temperature effect on overwrite (OW) characteristics for magnetic recording, using various heads and media, has been examined. Overwrites depend linearly on the difference (T2−T1) between…
Density and phase dependence of edge erase band in MR/thin film head recording
- Physics
- 1995
The erase band resulting from edge overwrite has been studied using magnetic force microscopy. Utilizing image processing techniques, we developed a method to accurately measure the width of the edge…