Shredding your garbage: Reducing data lifetime through secure deallocation (2005)

by Jim Chow , Ben Pfaff , Tal Garfinkel , Mendel Rosenblum
Venue:In USENIX Security
Citations:42 - 0 self

Active Bibliography

Understanding Data Lifetime via Whole System Simulation – Jim Chow Ben, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum - 2004
150 Understanding data lifetime via whole system simulation – Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum - 2004
Skype Forensics in Android Devices – Mohammed I. Al-saleh, Yahya A. Forihat
2 Abstract Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels – Alan M. Dunn, Michael Z. Lee, Suman Jana, Sangman Kim, Mark Silberstein, Yuanzhong Xu, Vitaly Shmatikov, Emmett Witchel
4 A Survey of Confidential Data Storage and Deletion Methods – Sarah M Diesburg, An-i Andy Wang
8 Securing history: Privacy and accountability in database systems – Gerome Miklau
SWIPE: Eager Erasure of Sensitive Data in Large Scale Systems Software – Kalpana Gondi, Prithvi Bisht, Praveen Venkatachari, A. Prasad Sistla, V. N. Venkatakrishnan
Defending Against Attacks on Main Memory Persistence ∗ – William Enck, Kevin Butler, Thomas Richardson, Patrick Mcdaniel, Adam Smith
6 Protecting cryptographic keys from memory disclosure attacks – Keith Harrison, Shouhuai Xu - 2007
485 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
Static Detection of Leaks in . . . – David L. Heine, Monica S. Lam - 2006
Practical Techniques for Eliminating Storage of Deleted Data – David Boutcher, Abhishek Chandra
1 Practical Techniques for Purging Deleted Data Using Liveness Information – David Boutcher
SPARC: A Security and Privacy Aware Virtual Machine Checkpointing Mechanism – Mikhail I. Gofman, Ruiqi Luo, Kartik Gopalan, Ping Yang
3 When Cryptography Meets Storage – Sarah M. Diesburg, Christopher R. Meyers, David M. Lary, An-i Andy Wang
23 Bump in the Ether: A Framework for Securing Sensitive User Input – Jonathan M. Mccune, Adrian Perrig, Michael K. Reiter - 2006
9 Remote Detection of Virtual Machine Monitors with Fuzzy Benchmarking – Jason Franklin, Arvind Seshadri, Mark Luk, Adrian Perrig, et al. - 2007
TeleDisk User’s Guide, version 4.3a based on TrueCrypt User’s Guide, version 4.3a. – Copyright Markus, Friedl All
Preventing Secret Leakage from fork(): – Securing Privilege-Separated Applications