A Trusted Platform Module Based Anti-Forensics System

被引:0
|
作者
Goh, Weihan [1 ]
Leong, Peng Chor [1 ]
Yeo, Chai Kiat [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore, Singapore
关键词
anti-forensics; trusted platform module; information confidentiality; plausible deniability;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A Trusted Platform Module (TPM) contains a unique identity and provides a range of security functions. This paper outlines a client-server system utilizing a TPM-enabled computer to hinder forensic examination. The system allows for data confidentiality, plausible deniability, and hiding of traces that incriminating data was present on the client. The server will attest the client before allowing it to submit / receive incriminating data, and encrypted incriminating data can only be decrypted 1) by the encrypting client, and 2) if and only if the encrypting client's platform configuration matches that during encryption. The client's state can always be established via measurement results, and they cannot be tampered to fake attestation.
引用
收藏
页码:46 / 50
页数:5
相关论文
共 50 条
  • [1] A Plausibly-Deniable, Practical Trusted Platform Module Based Anti-Forensics Client-Server System
    Goh, Weihan
    Leong, Peng Chor
    Yeo, Chai Kiat
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (07) : 1377 - 1391
  • [2] Robust Anti-forensics on Audio Forensics System
    Wang, Qingqing
    Ye, Dengpan
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT V, 2023, 14090 : 589 - 599
  • [3] A Dictionary Based Approach to JPEG Anti-Forensics
    Afshin, Nasser
    Razzazi, Farbod
    Moin, Mohammad-Shahram
    2016 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (IS), 2016, : 778 - 783
  • [4] Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem
    Harris, Ryan
    DIGITAL INVESTIGATION, 2006, : S44 - S49
  • [5] COUNTERING JPEG ANTI-FORENSICS
    Valenzise, G.
    Nobile, V.
    Tagliasacchi, M.
    Tubaro, S.
    2011 18TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2011,
  • [6] ANTI-FORENSICS OF JPEG COMPRESSION
    Stamm, Matthew C.
    Tjoa, Steven K.
    Lin, W. Sabrina
    Liu, K. J. Ray
    2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, : 1694 - 1697
  • [7] File system anti-forensics – types, techniques and tools
    Wani M.A.
    AlZahrani A.
    Bhat W.A.
    Computer Fraud and Security, 2020, 2020 (03): : 14 - 19
  • [8] Anti-Forensics of Chromatic Aberration
    Mayer, Owen
    Stamm, Matthew C.
    MEDIA WATERMARKING, SECURITY, AND FORENSICS 2015, 2015, 9409
  • [9] A Survey On Anti-Forensics Techniques
    Gul, Murat
    Kugu, Emin
    2017 INTERNATIONAL ARTIFICIAL INTELLIGENCE AND DATA PROCESSING SYMPOSIUM (IDAP), 2017,
  • [10] ANTI-Forensics - distorting the evidence
    Sartin, Bryan
    Computer Fraud and Security, 2006, 2006 (05): : 4 - 6