Defeating plausible deniability of veracrypt hidden operating systems

2Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper analyzes the security of VeraCrypt hidden operating systems. We present attacks on the plausible deniability attribute of hidden Operating Systems (OSs) created using VeraCrypt. We demonstrate that the encrypted outer volume can contain information that compromises the existence of a hidden OS, and the fact that it was running, even if only one copy of the encrypted drive is examined. To further investigate this, we show that cross drive analysis, previously used to analyze deniable file systems, can also be applied to prove the presence of a hidden OS volume and to estimate its size. In addition, we discuss other attack vectors that can be exploited in relation to cloud and network information leaks. This paper also examines the security requirements of a threat model in which the attacker has direct access to a running hidden OS.

Cite

CITATION STYLE

APA

Kedziora, M., Chow, Y. W., & Susilo, W. (2017). Defeating plausible deniability of veracrypt hidden operating systems. In Communications in Computer and Information Science (Vol. 719, pp. 3–13). Springer Verlag. https://doi.org/10.1007/978-981-10-5421-1_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free