Files
Download Presentation Slides (879 KB)
Publication Date
10-5-2017
Description
I will introduce the progress of our work in building deniable storage systems for mobile devices. Generally, we rely on encryption to protect confidentiality of sensitive data. This conventional approach, however, is vulnerable to a coercive attack, in which the attacker may capture the device’s owner and coerce the owner to disclose the decryption key. We mitigate such a coercive attack by leveraging deniable encryption, to deny the existence of sensitive data even though the decryption key is compromised. This is extremely useful when a professional journalist or human rights worker collects criminal evidence using his/her mobile device in a region of oppression or conflict, and can rely on the deniable encryption storage to protect the sensitive data even when he/she is caught by the terrorist. Our results for deniable storage for mobile devices have appeared in prestigious security conferences including ACM CCS ’17, ACSAC ’15 and ISC ’14
Disciplines
Computer Sciences
Recommended Citation
Chen, Bo, "Deniable encryption storage for mobile devices" (2017). TechTalks. 49.
https://digitalcommons.mtu.edu/techtalks/49