Abr 27 2011

Cluster positioning as a code

Tag: Informática LegalJoaquim Anguas @ 6:04 pm

To provide an additional layer of evasion, two-fold plausible deniability can be used to provide the covertly communicating parties two chances to deny the presence of hidden information. In their first attempt, the parties simply deny the very existence of hidden data. If the first approach does not succeed, they still have the option to only reveal the less sensitive information and deny the presence of any other hidden data on the medium as
in Anderson et al. (1998); McDonald and Kuhn (1999); Pang et al. (2003).”

Paper: “Designing a cluster-based covert channel to evade disk investigation and forensics” Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan Mirza; Elsevier’s “Computers & Security” 30 (2011) p 35 -49

Via Schneier on Security

Via New Scientist