A Multiple Snapshot Attack on Deniable Storage Systems

10/09/2021
by   Kyle Fredrickson, et al.
0

While disk encryption is suitable for use in most situations where confidentiality of disks is required, stronger guarantees are required in situations where adversaries may employ coercive tactics to gain access to cryptographic keys. Deniable volumes are one such solution in which the security goal is to prevent an adversary from discovering that there is an encrypted volume. Multiple snapshot attacks, where an adversary is able to gain access to two or more images of a disk, have often been proposed in the deniable storage system literature; however, there have been no concrete attacks proposed or carried out. We present the first multiple snapshot attack, and we find that it is applicable to most, if not all, implemented deniable storage systems. Our attack leverages the pattern of consecutive block changes an adversary would have access to with two snapshots, and demonstrate that with high probability it detects moderately sized and large hidden volumes, while maintaining a low false positive rate.

READ FULL TEXT
research
04/11/2019

Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses

Encrypted deduplication combines encryption and deduplication to simulta...
research
10/08/2020

Partitioned Private User Storages in End-to-End Encrypted Online Social Networks

In secure Online Social Networks (OSN), often end-to-end encryption appr...
research
01/17/2019

Side-Channel Attacks to Broadcasting of Encrypted Sources Using Correlated Keys

We consider the secure communication problem for broadcasting of two enc...
research
03/03/2022

Can Authoritative Governments Abuse the Right to Access?

The right to access is a great tool provided by the GDPR to empower data...
research
08/14/2023

Security Analysis of Filecoin's Expected Consensus in the Byzantine vs Honest Model

Filecoin is the largest storage-based open-source blockchain, both by st...
research
05/28/2022

Contributor-Aware Defenses Against Adversarial Backdoor Attacks

Deep neural networks for image classification are well-known to be vulne...
research
08/29/2019

How Much Does GenoGuard Really "Guard"? An Empirical Analysis of Long-Term Security for Genomic Data

Due to its hereditary nature, genomic data is not only linked to its own...

Please sign up or login with your details

Forgot password? Click here to reset