Files

Download

Download Presentation Slides (879 KB)

Publication Date

10-5-2017

Description

I will introduce the progress of our work in building deniable storage systems for mobile devices. Generally, we rely on encryption to protect confidentiality of sensitive data. This conventional approach, however, is vulnerable to a coercive attack, in which the attacker may capture the device’s owner and coerce the owner to disclose the decryption key. We mitigate such a coercive attack by leveraging deniable encryption, to deny the existence of sensitive data even though the decryption key is compromised. This is extremely useful when a professional journalist or human rights worker collects criminal evidence using his/her mobile device in a region of oppression or conflict, and can rely on the deniable encryption storage to protect the sensitive data even when he/she is caught by the terrorist. Our results for deniable storage for mobile devices have appeared in prestigious security conferences including ACM CCS ’17, ACSAC ’15 and ISC ’14

Disciplines

Computer Sciences

Deniable encryption storage for mobile devices

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.