1. bookVolume 2021 (2021): Issue 4 (October 2021)
Zeitschriftendaten
License
Format
Zeitschrift
Erstveröffentlichung
16 Apr 2015
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch
access type Open Access

Residue-Free Computing

Online veröffentlicht: 23 Jul 2021
Seitenbereich: 389 - 405
Eingereicht: 28 Feb 2021
Akzeptiert: 16 Jun 2021
Zeitschriftendaten
License
Format
Zeitschrift
Erstveröffentlichung
16 Apr 2015
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch

[1] TrueCrypt. http://truecrypt.sourceforge.net/. Search in Google Scholar

[2] Tails Portable Operating System. https://tails.boum.org/, 2020. Search in Google Scholar

[3] Pietro Albano, Aniello Castiglione, Giuseppe Cattaneo, and Alfredo De Santis. A Novel Anti-forensics Technique for the Android OS. In International Conference on Broadband and Wireless Computing, Communication and Applications, 2011. Search in Google Scholar

[4] Ross Anderson, Roger Needham, and Adi Shamir. The Steganographic File System. In International Workshop on Information Hiding, 1998. Search in Google Scholar

[5] Adam Bates, Dave Jing Tian, Kevin RB Butler, and Thomas Moyer. Trustworthy Whole-system Provenance for the Linux Kernel. In USENIX Security Symposium (Security), 2015. Search in Google Scholar

[6] Neil Brown. Overlay Filesystem. https://www.kernel.org/doc/html/latest/filesystems/overlayfs.html. Search in Google Scholar

[7] Chen Chen, Anrin Chakraborti, and Radu Sion. INFUSE: Invisible Plausibly-deniable File System for NAND Flash. Proceedings on Privacy Enhancing Technologies (PoPETS), 2020(4):239–254, 2020. Search in Google Scholar

[8] Alexei Czeskis, David J St Hilaire, Karl Koscher, Steven D Gribble, Tadayoshi Kohno, and Bruce Schneier. Defeating Encrypted and Deniable File Systems: TrueCrypt v5. 1a and the Case of the Tattling OS and Applications. In USENIX Workshop on Hot Topics in Security (HotSec), 2008. Search in Google Scholar

[9] Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The Second-Generation Onion Router. In USENIX Security Symposium (USENIX), August 2004. Search in Google Scholar

[10] Judicael Briand Djoko, Brandon Jennings, and Adam J Lee. Tprivexec: Private Execution in Virtual Memory. In ACM Conference on Data and Application Security and Privacy (CODASPY), 2016. Search in Google Scholar

[11] Christian DOrazio, Aswami Ariffin, and Kim-Kwang Raymond Choo. iOS Anti-forensics: How can we Securely Conceal, Delete and Insert Data? In Hawaii International Conference on System Sciences (HICS), 2014. Search in Google Scholar

[12] Tariq Elahi, George Danezis, and Ian Goldberg. PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks. In ACM Conference on Computer and Communications Security (CCS), November 2014. Search in Google Scholar

[13] Xianyi Gao, Yulong Yang, Huiqing Fu, Janne Lindqvist, and Yang Wang. Private Browsing: An Inquiry on Usability and Privacy Protection. In Workshop on Privacy in the Electronic Society (WPES), 2014. Search in Google Scholar

[14] Simson Garfinkel. Anti-forensics: Techniques, Detection and Countermeasures. In International Conference on i-Warfare and Security, 2007. Search in Google Scholar

[15] grsecurity. https://grsecurity.net/. Search in Google Scholar

[16] Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor. Away from Prying Eyes: Analyzing Usage and Understanding of Private Browsing. In Symposium on Usable Privacy and Security (SOUPS), 2018. Search in Google Scholar

[17] Michael Austin Halcrow. eCryptfs: An Enterprise-class Encrypted Filesystem for Linux. In Linux Symposium, 2005. Search in Google Scholar

[18] Junjiro R. Okajima. Aufs: Another Union Filesystem. http://aufs.sourceforge.net/. Search in Google Scholar

[19] Samy Kamkar. Evercookie – Virtually Irrevocable Persistent Cookies. https://samy.pl/evercookie/. Search in Google Scholar

[20] Andrew D McDonald and Markus G Kuhn. StegFS: A Steganographic File System for Linux. In International Workshop on Information Hiding, pages 463–477, 1999. Search in Google Scholar

[21] Brian Nishida. Ubuntu Artifacts Generated by the Gnome Desktop Environment. Technical report, SANS Institute, 2020. Search in Google Scholar

[22] Kaan Onarlioglu, Collin Mulliner, William Robertson, and Engin Kirda. PRIVEXEC: Private Execution as an Operating System Service. In IEEE Symposium on Security and Privacy (Oakland), 2013. Search in Google Scholar

[23] Zachary NJ Peterson, Randal C Burns, Joseph Herring, Adam Stubblefield, and Aviel D Rubin. Secure Deletion for a Versioning File System. In USENIX Conference on File and Storage Technologies (FAST), 2005. Search in Google Scholar

[24] Devin J Pohly, Stephen McLaughlin, Patrick McDaniel, and Kevin Butler. Hi-Fi: Collecting High-fidelity Whole-system Provenance. In Annual Computer Security Applications Conference (ACSAC), 2012. Search in Google Scholar

[25] David Quigley, Josef Sipek, Charles P Wright, and Erez Zadok. Unionfs: User-and Community-oriented Development of a Unification Filesystem. In Linux Symposium, 2006. Search in Google Scholar

[26] Joel Reardon, David Basin, and Srdjan Capkun. SoK: Secure Data Deletion. In IEEE Symposium on Security and Privacy (Oakland), 2013. Search in Google Scholar

[27] Konstantinos Solomos, John Kristoff, Chriss Kanich, and Jason Polakis. Tales of favicons and Caches: Persistent Tracking in Modern Browsers. In Network and Distributed Systems Security Symposium, 2021. Search in Google Scholar

[28] Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, and Wenke Lee. UCognito: Private Browsing without Tears. In ACM Conference on Computer and Communications Security (CCS), 2015. Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo