• Corpus ID: 18391293

Secure deletion of data from magnetic and solid-state memory

@inproceedings{Gutmann1996SecureDO,
  title={Secure deletion of data from magnetic and solid-state memory},
  author={Peter C. Gutmann},
  year={1996}
}
With the use of increasingly sophisticated encryption systems, an attacker wishing to gain access to sensitive data is forced to look elsewhere for information. One avenue of attack is the recovery of supposedly erased data from magnetic media or random-access memory. This paper covers some of the methods available to recover erased data and presents schemes to make this recovery significantly more difficult. 
Encrypting Virtual Memory
TLDR
The solution described in this paper uses swap encryption for processes in possession of confidential data that has been implemented for the UVM virtual memory system and its performance is acceptable.
On Secure Data Deletion
TLDR
Approaches to securely delete digital data are explored, different adversaries' capabilities are described, and how secure deletion approaches can be integrated into systems at different interface levels to protect against specific adversaries are shown.
Disposal of Disk and Tape Data by Secure Sanitization
TLDR
Recent disk drives with internal full disk encryption now implement an enhanced secure-erase command that takes only milliseconds to complete, according to federal guideline NIST 800-88.
Eraser: Your Data Won't Be Back
TLDR
This work presents a technique to provide secure deletion guarantees at file granularity, independent of the characteristics of the underlying storage medium, and describes an implementation of this scheme as a fileaware stackable block device deployed as a standalone Linux kernel module that does not require modifications to the operating system.
Data Deletion with Provable Security
TLDR
This paper presents a new approach to data storage for which a provably secure data deletion seems to be possible and provides rigid mathematical analysis of security of the proposed scheme for some scenarios even in the presence of an extremely powerful adversary.
The Packet Vault: Secure Storage of Network Data
TLDR
The packet vault is described, a cryptographically secured archiver of network packet data that captures network packets, encrypts them, and writes them to long-term CD-ROM storage for later analysis and for evidentiary purposes.
Deniable File System--Application of Deniable Storage to Protection of Private Keys
  • Bartosz Oler, I. E. Fray
  • Computer Science
    6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07)
  • 2007
This article discusses various ideas of deniable file systems, their advantages, drawbacks and use as a storage for sensitive data (e.g. private keys for the asymmetric algorithms). Also a design of
A survey of confidential data storage and deletion methods
TLDR
This survey summarizes and compares existing methods of providing confidential storage and deletion of data in personal computing environments.
Challenges and Designs for Secure Deletion in Storage Systems
TLDR
This paper surveys the state-of-the-art secure deletion techniques that have been designed to pursue higher efficiency, verifiability, and portability for emerging types of hard disk drives and flash-based solid-state drives.
A framework for password harvesting from volatile memory
TLDR
The presence of confidential data in RAM such as user passwords is investigated and it is shown that even if the computer is switched off but not removed from the mains, the data are preserved.
...
...

References

SHOWING 1-10 OF 30 REFERENCES
The changing nature of disk controllers
TLDR
The evolution of the disk controllers that interface disk drive storage devices and subsystems with their hosts is reviewed, showing the nature of the controller and its functions has undergone a significant change.
Emergency Destruction of Information Storing Media
TLDR
This IDA Report provides a basis for analyzing the appropriateness of various destruction technologies in the emergency destruction of information storing media, and leads to a research plan for developing specific destruction techniques, equipment, and procedures.
Magnetic force scanning tunneling microscope imaging of overwritten data
The MFSTM (magnetic force scanning tunneling microscopy) technique is shown to be a powerful technique for generating images of magnetization patterns. Images of the overwritten data on commercial
Relationship between overwrite and transition shift in perpendicular magnetic recording
The overwrite characteristics in perpendicular magnetic recording is discussed based on the transition shift. The transition shift during the write process caused by the interference in the vicinity
Microscopic investigations of overwritten data
The magnetic field distributions of overwritten patterns on rigid thin film disk media have been imaged with submicron resolution by using the magnetic force scanning tunneling microscope. The
Effects of current and frequency on write, read, and erase widths for thin-film inductive and magnetoresistive heads
The dependence of write, read, and erase widths on current and frequency for thin-film inductive (TFI) and inductive-write/magnetoresistive-read (MR) heads was studied. Currents of up to 150 mA and
Time-dependent magnetic phenomena and particle-size effects in recording media
Particle size is very important in determining the behavior of magnetic recording media. Particles must be large enough to provide adequate stability against time-dependent magnetic effects; these
Overwrite temperature dependence for magnetic recording
The temperature effect on overwrite (OW) characteristics for magnetic recording, using various heads and media, has been examined. Overwrites depend linearly on the difference (T2−T1) between
Density and phase dependence of edge erase band in MR/thin film head recording
The erase band resulting from edge overwrite has been studied using magnetic force microscopy. Utilizing image processing techniques, we developed a method to accurately measure the width of the edge
...
...