Proceedings 2015 Network and Distributed System Security Symposium 2015
DOI: 10.14722/ndss.2015.23258
|View full text |Cite
|
Sign up to set email alerts
|

Gracewipe: Secure and Verifiable Deletion under Coercion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Many other schemes, as well as adversary models of device capture are discussed in [24]. In [38], the authors proposed a method to securely delete data when under coercion. This is done through a deletion password, which when entered, will verifiably delete the data within a special disk in the device.…”
Section: Secure Deletionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many other schemes, as well as adversary models of device capture are discussed in [24]. In [38], the authors proposed a method to securely delete data when under coercion. This is done through a deletion password, which when entered, will verifiably delete the data within a special disk in the device.…”
Section: Secure Deletionmentioning
confidence: 99%
“…For example, the device may be split up into different volumes, which unlocks depending on which password the user enters. The idea of the system is as follows: when the user is requested to enter their password, they will input a 'decoy' password instead, to which the file system will direct the user to a file directory with predetermined inconspicuous-looking data [33,38].…”
Section: Introductionmentioning
confidence: 99%
“…A few files overwriting tools, e.g, srm (Jagdmann 2015) and wipe (Durak 2006), can be used to securely remove files. Gracewipe (Zhao and Mannan 2015), as has been discussed in "PDE for desktop computers" section, can achieve secure and verifiable deletion of encryption keys through a special deletion password by taking advantage of TPM and Intel TXT, thus making the encrypted data permanently inaccessible. In the case of database, there is also a secure deletion interface, which can be used to overwrite data with zeros in the underlying file system.…”
Section: Secure Deletion For Hdds-based Storage Systemsmentioning
confidence: 99%
“…They may also have different deletion granularity. Generally, the encryption-based secure deletion approaches for HDDs-based storage systems Peterson et al 2005;Zhao and Mannan 2015) have relatively low performance overheads since only keys need to be deleted to achieve secure deletion.…”
Section: Secure Deletion For Hdds-based Storage Systemsmentioning
confidence: 99%
“…Cloud data assured deletion based on trusted execution environments. 10,11 The basic idea of this method is to build a secure deleted executable environment from two aspects of hardware and software, but it needs to add trusted enhancement settings on the existing cloud computing infrastructure, so this method is difficult to achieve. 2.…”
Section: Introductionmentioning
confidence: 99%