New versions of Windows come equipped with mechanisms, such as EFS and BitLocker, which are capable of encrypting data to an industrial standard on a Personal Computer. This creates problems if the computer in question contains electronic evidence. BitLocker, for instance, provides a secure way for an individual to hide the contents of their entire disk, but as with most technologies, there are bound to be weaknesses and threats to the security of the encrypted data. It is conceivable that this technology, while appearing robust and secure, may contain flaws, which would jeopardize the integrity of the whole system. As more people encrypt their hard drives, it will become harder and harder for forensic investigators to recover data from Per...
This paper discusses the development of a new method for encrypting text of information in Microsof...
We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by reverse e...
Data in digital form is considered one of the most valuable assets. Digital data may pertain to fina...
This paper focuses on security of information saved on hard disk drives using encryption. The posibi...
Current computer forensic practices primarily advise analysts to review and search all digital evide...
Encryption is the art of preserving confidentiality of digital information. It is considered to be o...
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM...
Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protect...
Cybercrime is a serious social problem. Data security threats affect not only large financial organi...
When having sensitive information on portable computers it’s important to make sure that the data is...
We discuss attack scenarios against the TPM-based boot process of BitLocker. Bit Locker is a disk vo...
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TP...
We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by reverse e...
Self encrypting devices (SEDs) doing full disk encryption are getting more and more widespread. Hard...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
This paper discusses the development of a new method for encrypting text of information in Microsof...
We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by reverse e...
Data in digital form is considered one of the most valuable assets. Digital data may pertain to fina...
This paper focuses on security of information saved on hard disk drives using encryption. The posibi...
Current computer forensic practices primarily advise analysts to review and search all digital evide...
Encryption is the art of preserving confidentiality of digital information. It is considered to be o...
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM...
Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protect...
Cybercrime is a serious social problem. Data security threats affect not only large financial organi...
When having sensitive information on portable computers it’s important to make sure that the data is...
We discuss attack scenarios against the TPM-based boot process of BitLocker. Bit Locker is a disk vo...
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TP...
We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by reverse e...
Self encrypting devices (SEDs) doing full disk encryption are getting more and more widespread. Hard...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
This paper discusses the development of a new method for encrypting text of information in Microsof...
We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by reverse e...
Data in digital form is considered one of the most valuable assets. Digital data may pertain to fina...