Abstract
Full Disk Encryption (FDE) has become a widely used security feature. Although FDE can provide confidentiality, it generally does not provide cryptographic data integrity protection. We introduce an algorithm-agnostic solution that provides both data integrity and confidentiality protection at the disk sector layer. Our open-source solution is intended for drives without any special hardware extensions and is based on per-sector metadata fields implemented in software. Our implementation has been included in the Linux kernel since the version 4.12.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
1 Introduction
Storage encryption has found its way into all types of data processing systems – from mobiles up to big data warehouses. Full Disk Encryption (FDE) is a way to not only provide data confidentiality but also provide an easy data disposal procedure (by shredding the used cryptographic key). FDE and the underlying block device work with the disk sector as an atomic and independent encryption unit, which means that FDE can be transparently placed inside the disk sector processing chain.
A major shortcoming of current FDE implementations is the absence of data integrity protection. Confidentiality is guaranteed by symmetric encryption algorithms, but the nature of length-preserving encryption (a plaintext sector has the same size as the encrypted one) does not allow for any metadata that can store integrity protection information.
Cryptographic data integrity protection is useful not only for detecting random data corruption [27] (where a CRC-like solution may suffice) but also for providing a countermeasure to targeted data modification attacks [38]. Currently deployed FDE systems provide no means for proving that data were written by the actual user. An attacker can place arbitrary data on the storage media to later harm the user. FDE systems such dm-crypt [4, 21] or BitLocker [19] simply ignore the data integrity problem, and the only way to detect an integrity failure is the so-called poor man’s authentication (user can recognize data from garbage produced by the decryption of a corrupted ciphertext).
The aim of our work is to demonstrate that we can build practical cryptographic data integrity and confidentiality protection on the disk sector layer with acceptable performance and without the need for any special hardware. Our solution is an open-source extension of existing tools; we do not invent any new cryptographic or storage concepts. To achieve this goal, we implemented a per-sector metadata store over commercial off-the-shelf (COTS) devices. We provide an open-source implementation as a part of the mainline Linux kernel, where it is crucial to avoid proprietary and patented technology.
We focus on the security of authenticated encryption and the algorithm-agnostic implementation. Our main contributions are as follows:
-
separation of storage and cryptographic parts that allow changing the underlying per-sector metadata store implementation without modifying the encryption layer,
-
the concept and implementation of emulated per-sector metadata,
-
algorithm-agnostic implementation of sector authenticated encryption in the Linux kernel and
-
use of random initialization vector for FDE.
Storage security has often been perceived as an additional function that can easily be added later. The history of length-preserving FDE is a demonstration of this false idea. Although it is a simple application of cryptography concepts, some vendors deployed FDE not only with known vulnerabilities but also with incorrectly applied cryptography algorithms [7, 34].
The remainder of this paper is organized as follows. Section 2 discusses the threat model and introduces the data corruption problem. Section 3 describes proposed algorithms for encryption and integrity protection. Section 4 discusses how to store additional integrity data and extends the proposed metadata store concept to construct a reliable virtual device that handles both data and metadata. Sections 5 and 6 describe our practical implementation and performance evaluation. Section 7 concludes our paper and identifies future work.
2 Threat Model and Use Cases
Use cases for of FDE can be categorized to several situations, like stolen mobile device or laptop, devices in repair, resold improperly wiped devices, virtual device in a multi-tenant environment, or a mobile device storage. In all of these scenarios, confidential data can leak out of the control of the owner. A recent analysis of the content of used drives [29] shows that encryption is often still not used despite the importance of storage data encryption being recognized for a long time [32].
Our threat model adds to all these scenarios the detection of data tampering on leaked (not-wiped) devices and expects that an attacker has limited ability to record device changes with access snapshots of the device in time. The model recognizes the Focused Opportunistic attacker defined in Table 1. It does not protect data in situations when a device is in active (unlocked) state or an attacker can get the unlocking passphrase (and thus encryption key) directly. As mentioned in Sect. 1, our model expects COTS devices, it cannot rely on use of any of tamper-proof cryptographic devices like Hardware Security Modules (HSMs).
2.1 Attackers
We define three simplified types of attackers, as summarized in Table 1. The most common type of attacker for FDE is a random attacker. We define a focused opportunistic attacker type for sophisticated attacks that focus on the situation where the stolen device is returned to the user. In the targeted attacker case, FDE will not provide sufficient protection without additional countermeasures.
2.2 FDE Protection Types
For the description of our model, we define three basic levels of protection, as summarized in Table 2. Here, FDE protection (of any type) means that the data confidentiality is enforced. A simple case of a device theft means that only hardware is lost. Data remain encrypted and not accessible to the attacker. This scenario is covered by the Pure FDE protection. The importance of authenticated FDE comes into play when the stolen or seized device returns to the user (and this often occurs in reality; and example can be mandatory border checks).
This situation is generally enforced by a security policy and compliance of users. The reality is different – experiments show that people plug-in foreign devices, even if such devices are obtained under suspicious circumstances [37].
Authenticated encryption enforces that a user cannot read tampered data but will see an authentication error. It not only stops any attempts to use tampered data on higher layers, but also helps a user to realize that the device is no longer trustworthy. An overview of the features among FDE types is summarized in Table 3.
2.3 Data Corruption and Forgery
So-called silent data corruption [9] is a common problem in persistent storage. This problem occurs when data are unintentionally and randomly corrupted while traversing through the storage stack. It is generally caused by flaky hardware (unstable memory bits and loose cables), triggered by an external influence (ionizing radiation) or by misplacement of data (correct data are written to an incorrect place). Data are then stored and used in a corrupted form.
A solution is to detect data corruption by checksums such as CRC32 [35]. This solution is not adequate if we want to detect an intentional unauthorized change (an attacker will simply fix a checksum).
An active attacker can not only cause undetected data corruption by simulating silent data corruption but can also attempt to forge the data by corrupting a specific disk area. A more sophisticated attacker can store additional data using steganographic techniques (conceal other data) to unused areas of a disk. We have to use a cryptographic integrity protection to detect such a situation.
2.4 Replay Attacks
In the strong view of cryptographic integrity protection, we should also detect data replacement using old content (revert to snapshots, also called replay attack [15]). Such a requirement cannot be fulfilled without an additional trusted metadata store independent of the storage itself. The content of the entire storage can always be completely replaced with an older snapshot. Without additional and trusted information, users cannot recognize such a situation. An attacker can also revert only a partial part of the storage (in our case, selected sectors). From the cryptographic perspective, this situation cannot be completely prevented or detected (it would require breaking the independence of sectors).
In this text, we present algorithms that do not protect from the replay attack. This decision is based on the fact that our work is focused on utilizing standard disk drives without any additional hardware requirements.
3 Length-Preserving and Authenticated Encryption
Length-preserving encryption algorithms are used in current FDE solutions. These algorithms transform original data (plaintext) to its encrypted form (ciphertext), and confidentiality is based on the use of secret keys. Storage data are (for performance reasons) always encrypted with symmetric block ciphers.
The block sizes of these symmetric ciphers are typically 16 bytes. The device sector size is considerably larger (at least 512 bytes); thus, to apply encryption per sector, we have to utilize a block encryption mode inside a sector. Current FDE systems use CBC [19] or XTS [18] modes. The CBC mode has many known problems [21] and specific requirements (see the note in Sect. 3.2).
The XTS mode, due to the internal parallel processing of blocks, can leak more information about a change in the plaintext than other modes. If only a single byte changes in a sector, then we can localize the change with the internal cipher block granularity. An ideal FDE system should produce a pseudo-random change of the entire sector data. Also these modes produces the same plaintext data encrypted to the same sector always produce the same ciphertext. In cryptography, this means that such a system does not fully provide indistinguishability under chosen plaintext attack (IND-CPA) [22, 26].
3.1 Authenticated Encryption
We have two options for integrity protection combined with device encryption: either to use Authenticated Encryption with Additional Data (AEAD) [10, 33] or to combine length-preserving encryption with an additional cryptographic integrity operation. The major difference is that for the combined mode, we can ignore integrity tags and decrypt the data without such tags. In the AEAD mode, the authentication is an integral part of decryption. Additionally, for the combined mode, we need to provide two separate keys (encryption and authentication), whereas the AEAD mode generally derives the authentication key internally. Both mentioned integrity methods calculate an authentication tag from the final ciphertext (encrypt-then-MAC).
The encryption operation output consists of the encrypted data and the authentication tag. Authentication mode with additional data (AEAD) calculates the authentication tag not only from the input data but also from additional metadata, called additional authentication data (AAD). Table 4 summarizes examples of the encryption modes mentioned in this text.
3.2 Initialization Vectors
The Initialization Vector (IV) is a value for an encryption mode that tweaks encryption. In FDE, the IV must always be derived from a sector number (offset from the device start) to prevent malicious sector relocation. The sector number guarantees that the same data written to different sectors produce different ciphertexts. The proper use of IVs and nonces depends on the exact encryption mode and is critical for the security of the entire solution. Table 5 briefly describes the IV types used in our work. For the CBC mode, we must use an IV that an adversary cannot predict; otherwise, the IV value can be used (in combination with a specially formatted plaintext) to create special patterns in the ciphertext (watermarks) [21, 34]. Some encryption modes (such as XTS) solve this problem by encrypting the IV such that they can use a predictable sector number directly.
The IV must always be unique per sector. In some cases, the IV must be a nonce (a public value that is never reused). Repeating an IV for different sectors not only opens a possibility to malicious sector relocation but can also violate a security restriction (in the GCM mode repeating a nonce value is fatal [23]).
We define a new random-IV that regenerates its value on every write operation by reading it from a system Random Number Generator. The random-IV length should be at least 128 bits to avoid collision. Since stored values are visible to an adversary, the random-IV cannot be used for modes that require unpredictable IVs.
3.3 Error Propagation in Encrypted Sector
With the symmetric encryption in the processing stack, error propagation is amplified. One bit flip causes a random corruption in at least one cipher block (typically 16 bytes) up to the entire sector. This is illustrated in Fig. 1.
Such a “random corruption” means that decrypted data are a product of the decryption of a modified ciphertext. By definition, modern ciphers [20] must produce a random-looking output. In other words, a user will see a block full of data garbage after decrypting corrupted data.
For encryption, the change propagation is, in fact, a desirable effect. The ideal situation is that any change in the sector data is propagated to a pseudo-random change to the whole encrypted sector.
4 Metadata Storage Placement
The absence of per-sector metadata (to store integrity protection data) is a well-known problem. Integrity protection requires a length expansion of the processed data and thus needs additional storage [36]. Common sector sizes are 512 and 4096 bytes, and we need an independent metadata per-sector.
4.1 Metadata in Hardware Sector
A reliable way to handle integrity metadata is to do so directly in the device hardware sector. An in-sector integrity data approach appeared in 2003 as the T10 Data Integrity Field (DIF) extension for SCSI devices [24]. This idea was implemented by vendors as T10 Protection Information (T10-PI) where a sector is expanded by 8 bytes (the sector size is 520 bytes) [31]. For COTS devices, the DIF extension is quite rare, expensive and requires a special controller. The fixed provided metadata space is not large enough for cryptographic data integrity protection that requires storing an Initialization Vector to metadata.
4.2 Metadata Stored Separately
Per-sector metadata can be stored in a separate storage space on the same disk or an external fast storage [36]. We can also join several smaller hardware sectors and metadata into one large virtual sector presented to the upper layer. This approach is used in authenticated modes in the FreeBSD GEOM encryption system [14, 25]. The initial GEOM Based Disk Encryption (GBDE) [25] tried to use additional metadata for generated per-sector keys. This design does not provide safe atomic sector updates and also significantly decreases performance (throughput is only 20–25% of an underlying device) [16]. Some of these problems were fixed by the GELI disk encryption [14]. Here, the upper layer uses a 4096-byte sector, while internally, it splits data into 512-byte native sectors (each contains its own data and metadata). In this case, for every presented sector, 8 + 1 native sectors are used. This concept ensures that integrity data are handled on the atomic hardware sectors. Although the above filesystem sees the 4096-byte sector as an atomic unit, the device operates with 512-byte units and can possibly interleave multiple writes. Another problem with this design is that the virtual sector is always larger than the native device sector. If the native sector is 4096 bytes, then the presented virtual sector can be larger than the optimal block size for the filesystem above (for some filesystems, the optimal size can be a page size, and thus, it is 4096 bytes in most situations).
Enterprise storage vendors also implement a multiple-sector schema, generally with 8 data sectors + 1 common metadata sector [9].
4.3 Interleaved Metadata Sectors
Our solution combines the use of a device integrity profile with a metadata per-sector stored independently in dedicated sectors. The presented sector size is configurable. We can use the same size as a native device, but we can also increase the presented sector size (atomicity is then ensured by journaling, as described in Sect. 4.4). The combined data and metadata are then presented to the block layer as a new virtual device with a specific integrity profile (software-emulated DIF-enabled device).
The metadata are stored in special sectors that are interleaved with data sectors. According to the required metadata size, one sector contains a metadata store for several consecutive sectors. An illustration of this layout is provided in Fig. 2. Required space examples are illustrated in Table 6.
The required size of additional sectors is calculated as follows:
The use of storage is optimal (no wasted space) when the sector size is a multiple of the tag size. Additional metadata space (part of a device used for metadata) is calculated as
4.4 Recovery on Write Failure
A device must provide atomic updating of both data and metadata. A situation in which one part is written to media while another part failed must not occur. Furthermore, metadata sectors are packed with tags for multiple sectors; thus, a write failure must not cause an integrity validation failure for other sectors.
A metadata-enabled device must implement a data journal that provides a reliable recovery in the case of a power failure. The journal can be switched off if an upper layer provides its own protection of data.
In some specific situations, a journal could provide unintended additional information about the encrypted device (such as last written data offsets or old data content of unfinished sector writes). A journal requires additional storage and decreases performance on write (data are written twice). The journal size is generally just a fraction of the device capacity.
5 Linux Kernel Implementation
We split the solution into storage and cryptographic parts. The former provides an area for per-sector metadata for commercial off-the-shelf (COTS) storage devices. The latter extends disk encryption by cryptographically sound integrity protection. For key management, we extended the LUKS encryption system [5] to provide support for our integrity protection. Implementation details can be found in the extended technical report [13].
Our approach is based on the existing block layer integrity profile infrastructure [31] and is fully contained in the device-mapper kernel subsystem. The principle of the device-mapper architecture is that separate functions are combined by stacking several devices, each with a specific target that implements the needed function. For integrity-enabled encryption, there are three stacked devices: dm-crypt device (encrypts and authenticates data), dm-integrity device (provides per-sector metadata) and an underlying block device (disk or partition). The top-level device is available to a user and can be used directly by an application or an arbitrary filesystem.
5.1 Sector Authenticated Encryption
The integrity tag is calculated for all sectors, including sectors that are not in use. On the initial activation, the device has to recalculate all integrity tags; otherwise, all reads fail with an integrity error.
To perform an authenticated encryption operation over a sector, we define the format of a sector authentication request. The additional data (AAD) for our request contain the sector number and the IV.
Such a request detects a sector misplacement and a corrupted IV. The request definition is compatible with the current IEEE 1619 storage standard [2, 17].
5.2 The dm-integrity and the dm-crypt Module
The implemented dm-integrity device-mapper target creates a virtual device with arbitrary-sized per-sector metadata over the standard block device and presents it to the system as a device with a specific integrity profile.
The dm-integrity target can operate in two modes: as a provider of per-sector metadata for the upper device or in standalone mode, where it calculates and maintains basic data integrity checksums itself. For reads, it combines the data and metadata sectors and submits them to the upper layer. For writes, it splits data and metadata and submits new I/O requests to the underlying device.
The dm-crypt module is a Linux in-kernel implementation of FDE. To support authenticated encryption, we implemented the following parts: configuration table format for integrity protection, interface to the underlying I/O dm-integrity profile, processing of requests specified in Table 7 and new random-IV generator.
All cryptographic primitives are provided by the kernel cryptographic API. This provides us with all the hardware support and acceleration available. When an integrity check fails, the I/O request is marked as failed and returned to the block layer.
6 Performance
We present two simple benchmarks to illustrate the usability of our solution. The first benchmark measures linear access to the device and the second is a synthetic I/O benchmark with interleaved reads and writes.
We used the mainline kernel 4.13 [6] and cryptsetup tool [5]. The tests ran on a basic installation of the Fedora 26 Linux, were repeated ten times, and the arithmetic mean with the standard deviation (in the format value ±SD) is then presented. All cryptographic hardware acceleration modules were loaded.
The hardware configuration represents a typical user configuration that we expect our solution would be used with and was set as folows: Lenovo x240 laptop, Intel Core i7-4600U 2.10 GHz CPU (with AES-NI and SSE3), 8 GB RAM and Toshiba THNSFJ256GCSU 256 GB SSD.
6.1 Linear Access
We ran tests that measured the speed of reads and writes to the entire device. The I/O block size was fixed to 4 kB (presenting a page cache I/O that always produces a page-sized I/O as the minimum).
We ran the tests both with the dm-integrity data journal and without the journal (this simulates a situation when a journaling is already present on an upper layer). The measured data are presented in Fig. 3.
The measured data show that the overhead of the length-preserving encryption in this scenario is almost negligible. The only visible overhead is for the write operation.
Disabling the data journal has an effect only for write operations. The most visible output is the overhead of additional metadata processing. The overhead of cryptographic data integrity processing is visible for all three authenticated modes.
6.2 Random I/O Throughput
We simulated workload with the fio [8] (Flexible I/O Tester) utility. We used a fio profile simulating mixed reads (70%) and writes (30%) that generates random data access offsets with I/O operations of the 8k block in size. The test uses 16 parallel jobs, asynchronous I/Os and runs for at least 100 seconds.
This test should represent the worst case scenario in our comparison. The measured results are presented in Fig. 4. We can see that a journal has a small effect in this scenario; the major visible slowdown is in the additional metadata processing.
7 Conclusions
Our goal was not only to show that the combination of confidentiality and cryptographic data integrity protection is possible at the FDE layer, but also to highlight the need for proper cryptographic data integrity protection in general. We focused on existing COTS devices without any specific hardware requirements. Almost all laptops are currently delivered with an SSD. In this scenario, the performance evaluation shows that our data integrity protection is usable for these systems.
The dm-integrity module provides a generic solution for additional metadata per sector. The price to pay is decreased storage performance and storage capacity, but we believe this is balanced by a zero-cost investment to required hardware. The extension to dm-crypt FDE is algorithm-agnostic. The configuration of another encryption mode is just a configuration option.
It appears that ChaCha20 with the Poly1305 authenticator [30] is the authentication encryption algorithm of choice today, yet this can easily change with the CAESAR [3] competition or a new GCM-SIV [23, 28] mode.
Both configurable metadata per-sector and encryption upgrades of algorithms are the major advantages to hardware-based encryption solutions, where any reconfiguration during their lifetime is almost impossible.
All code presented in this work is released under the open-source GPL2 license and has been included in the Linux mainline kernel since the version 4.12 and userspace cryptsetup tool [5] since the version 2.0.0.
7.1 Future Work
Integrity protection is generally used on a higher layer than device sectors [39]. The dm-integrity feature could be used later even for another task such as an application-level integrity protection (application could send its own data to be stored on per-sector level) of storing additional Forward Error Correction codes (the storage could then not only detect integrity problems but also fix basic random data corruptions).
Additionally, the same principle can be applied to new storage device types, such as persistent memory (or any byte-addressable persistent storage), where we can easily increase the size of the additional authentication tag (in principle, we can use virtual sector of any size). In this case, the dm-integrity layer can be omitted (the atomicity of data and metadata writes is provided by the storage itself), while the dm-crypt cryptographic part of the solution remains the same.
References
FIPS Publication 197, the advanced encryption standard (AES) (2001), U.S. DoC/NIST
IEEE standard for authenticated encryption with length expansion for storage devices. IEEE Std 1619.1-2007 (2008). https://doi.org/10.1109/IEEESTD.2008.4523925
CAESAR: competition for authenticated encryption: security, applicability, and robustness (2016). http://competitions.cr.yp.to/caesar.html
DM-crypt: Linux device-mapper crypto target (2017). http://gitlab.com/cryptsetup/cryptsetup/wikis/DMCrypt
LUKS: Linux unified key setup (2017). http://gitlab.com/cryptsetup/cryptsetup
Linux mainline kernel archive (2018). http://kernel.org
Alendal, G., et al.: Got HW crypto? On the (in)security of a self-encrypting drive series. IACR Cryptology ePrint Archive (2015)
Axboe, J.: Flexible I/O tester (2017). http://github.com/axboe/fio
Bairavasundaram, L.N., et al.: An analysis of data corruption in the storage stack. ACM Trans. Storage 4(3), 8 (2008)
Bellare, M., et al.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. J. Digital Forensics Secur. Law 21(4), Article 6, 23–33 (2008). https://doi.org/10.15394/jdfsl.2016.1428
Bernstein, D.J.: ChaCha, a variant of Salsa20 (2008). http://cr.yp.to/chacha/chacha-20080120.pdf
Böck, H., et al.: Nonce-disrespecting adversaries: practical forgery attacks on GCM in TLS. IACR Cryptology ePrint Archive (2016)
Brož, M., et al.: Practical cryptographic data integrity protection with full disk encryption. Technical report (2018). https://gitlab.com/cryptsetup/cryptsetup/wikis/integritytechreport
Dawidek, P.J.: FreeBSD GELI encryption system (2011). http://github.com/freebsd/freebsd/blob/master/sys/geom/eli/g_eli_integrity.c
van Dijk, M., et al.: Offline untrusted storage with immediate detection of forking and replay attacks. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC 2007, ACM (2007)
Dowdeswell, R.C.: Initial analysis of GBDE (2003). http://www.imrryr.org/~elric/cgd/gbde-analysis2.pdf
Dworkin, M.J.: SP 800–38D recommendation for block cipher modes of operation: galois/counter mode (GCM) and GMAC, NIST (2007)
Dworkin, M.J.: SP 800–38E recommendation for block cipher modes of operation: the XTS-AES mode for confidentiality on storage devices, NIST (2010)
Ferguson, N.: AES-CBC + Elephant diffuser: a disk encryption algorithm for Windows Vista, Microsoft Corporation (2006)
Ferguson, N.: Cryptography Engineering: Design Principles and Practical Applications. Wiley Publishing, Hoboken (2010)
Fruhwirth, C.: New methods in hard disk encryption. Ph.D. thesis, Institute for Computer Languages Theory and Logic Group, Vienna University of Technology (2005)
Gjøsteen, K.: Security notions for disk encryption. In: di Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 455–474. Springer, Heidelberg (2005). https://doi.org/10.1007/11555827_26
Gueron, S., et al.: GCM-SIV: full nonce misuse-resistant authenticated encryption at under one cycle per byte. In: Cryptology ePrint Archive (2015)
Holt, K.: End-to-End Data Protection Justification (2003), www.t10.org/ftp/t10/document.03/03-224r0.pdf, T10 Technical Committee proposal letter
Kamp, P.H.: GBDE: GEOM based disk encryption. In: Proceedings of the BSD Conference 2003 on BSD Conference, USENIX (2003)
Khati, Louiza, Mouha, Nicky, Vergnaud, Damien: Full disk encryption: bridging theory and practice. In: Handschuh, Helena (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 241–257. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-52153-4_14
Krioukov, A., et al.: Parity lost and parity regained. In: Proceedings of the 6th USENIX Conference on File and Storage Technologies, USENIX Association (2008)
Lindell, Y., et al.: AES-GCM-SIV: nonce misuse-resistant authenticated encryption. In: Internet-Draft draft-IRTF-CFRG-GCMSIV-03 (2017)
Martin, T., et al.: The 2016 analysis of information remaining on computer hard disks offered for sale on the second hand market in the UAE. J. Cryptology 21(4), 469–491 (2016). https://doi.org/10.1007/s00145-008-9026-x
Nir, Y., et al.: ChaCha20 and Poly1305 for IETF Protocols. In: RFC 7539 (2015)
Petersen, M.K.: T10 data integrity feature (logical block guarding). In: Linux Storage & Filesystem Workshop (2007)
Riedel, E., et al.: A framework for evaluating storage system security. In: Proceedings of the 1st USENIX Conference on File and Storage Technologies, vol. 2. USENIX Association (2002)
Rogaway, P.: Authenticated-encryption with associated-data. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (2002)
Saarinen, M.J.O.: Encrypted watermarks and Linux laptop security. In: Workshop on Information Security Applications, Revised Selected Papers (2005)
Satran, J., et al.: Internet protocol small computer system interface (iSCSI) cyclic redundancy check (CRC)/checksum considerations, In: RFC 7539 (2015)
Sivathanu, G., et al.: Ensuring data integrity in storage: techniques and applications. In: ACM Workshop on Storage Security and Survivability (2005)
Tischer, M., et al.: Users really do plug in USB drives they find. In: 2016 IEEE Symposium on Security and Privacy (SP) (2016)
Türpe, S., Poller, A., Steffan, J., Stotz, J.-P., Trukenmüller, J.: Attacking the bitlocker boot process. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 183–196. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00587-9_12
Zhang, Y., et al.: End-to-end data integrity for file systems: a ZFS case study. In: Proceedings of the 8th USENIX Conference on File and Storage Technologies, USENIX Association (2010)
Acknowledgments
The authors thank Arno Wagner, John Strunk, Ondrej Mosnáček, Virgil Gligor and Ric Wheeler for valuable comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 IFIP International Federation for Information Processing
About this paper
Cite this paper
Brož, M., Patočka, M., Matyáš, V. (2018). Practical Cryptographic Data Integrity Protection with Full Disk Encryption. In: Janczewski, L., Kutyłowski, M. (eds) ICT Systems Security and Privacy Protection. SEC 2018. IFIP Advances in Information and Communication Technology, vol 529. Springer, Cham. https://doi.org/10.1007/978-3-319-99828-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-99828-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99827-5
Online ISBN: 978-3-319-99828-2
eBook Packages: Computer ScienceComputer Science (R0)