Feeds

Boffins devise way to hide secret data on hard drives

Technique evades forensics investigations

The essential guide to IT transformation

Computer scientists have developed software that hides sensitive data on hard drive, without the use of encryption, by controlling the precise disk locations containing the file's data fragments.

The application, which the academic researchers said they would release as open-source software, makes use of steganography, or the ancient art of hiding secret information in plain sight. The technique has long been employed to keep sensitive data out of the hands of adversaries. The use of encryption, by contrast, is easy to detect, tipping off adversaries that a hard drive or other piece of media contains information considered secret.

The software ensures that individual disk clusters that store the sensitive data fragments are positioned in a way predetermined by their code. A person who later wants to read the secret information uses the same application to reassemble the file. The inventors said their method makes it possible to stealthily store a 20-megabyte message on a 160-gigabyte portable hard drive.

“We have presented a novel data security mechanism, a filesystem-based covert channel which allows a user to evade disk forensics by securely hiding data in a removable or permanent mass storage device,” the researchers wrote in their paper, titled Designing a cluster-based covert channel to evade disk investigation and forensics. “Information is hidden in a manner such that an investigator is unable to positively prove the existence of hidden data.”

The researchers, from the University of Southern California in Los Angeles and the National University of Science and Technology in Islamabad, Pakistan, said the technique may cause only small performance degradations. In some cases, the approach requires the data to be hidden through the use of a secret shared between the sender and recipient. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.