Shredding your garbage: Reducing data lifetime through secure deallocation (2005)

by Jim Chow , Ben Pfaff , Tal Garfinkel , Mendel Rosenblum
Venue:In USENIX Security
Citations:43 - 0 self

Documents Related by Co-Citation

150 Understanding data lifetime via whole system simulation – Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum - 2004
485 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
105 Least we remember: Cold boot attacks on encryption keys – J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Cal, Ariel J. Feldman, Edward W. Felten - 2008
23 A revocable backup system – D Boneh, R Lipton - 1996
126 Secure Deletion of Data from Magnetic and Solid-State Memory – Peter Gutmann - 1996
16 Data lifetime is a systems problem – Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum - 2004
44 Encrypting Virtual Memory – Niels Provos - 2000
24 Threats to privacy in the forensic analysis of database systems – P Stahlberg, G Miklau, B Levine - 2007
18 AES-CBC + Elephant diffuser: A disk encryption algorithm for Windows Vista – Niels Ferguson - 2006
16 Secure deletion for a versioning file system – Zachary N. J. Peterson, Randal Burns, Joe Herring, Adam Stubblefield, Aviel D. Rubin - 2005
211 Architectural Support for Copy and Tamper Resistant Software – David Lie, Chandramohan Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell, Mark Horowitz - 2000
27 Secure data deletion for Linux file systems – S BAUER, N B PRIYANTHA - 2001
18 The Ephemerizer: Making Data Disappear – Radia Perlman, Radia Perlman - 2005
467 StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks – Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang - 1998
149 Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks – Wei Xu, Sandeep Bhatkar, R. Sekar - 2006
49 Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution – Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang - 2008
36 Tupni: Automatic Reverse Engineering of Input Formats – Weidong Cui, Helen J. Wang, Marcus Peinado, Luiz Irun-briz, Karl Chen - 2008
281 Database Management Systems – R Ramakrishnan, J Gehrke - 2000
6 eCryptfs: a stacked cryptographic filesystem – M Halcrow - 2007