A new application can hide sensitive data on a hard drive without encrypting it or leaving any obvious signs that the data is present, according to the academic researchers who developed it.
The new technique would allow organisations to safely conceal about 20 MB of private information, on a typical 160 GB, hard disk from unauthorised users.
Hassan Khan, Mobin Javed, Syed Ali Khayam and Fauzan Mirza collaborated on the paper, “Designing a Cluster-Based Covert Channel to Evade Disk Investigation and Forensics.” Khan and his colleagues claimed the process hid data so effectively that it would be “unreasonably complex” for a third-party to detect it.
The method employs a “covert channel” to encode sensitive information. Instead of the operating system writing small pieces of the file in random areas on the hard drive, the software chooses the positions according to a secret code. The person who wants to access the file needs to know the key to figure out where the fragments were written and re-assemble the clusters accordingly.
“We present a new, plausible deniability approach to store sensitive information on a cluster-based filesystem,” the researchers wrote in the paper.
The process does not leave behind any information about what it did, so anyone looking at the hard disk drive cannot see the hidden information or even be able to tell it exists, the researchers claimed. The hard drive would look like any other moderately fragmented drive.
Currently, users interested in protecting data generally wind up using encryption software. However, existing cryptographic methods generally leave behind some indicators that that the file has been encrypted. Attackers know there is something hidden and can try to use other methods to obtain the secret key to access the data.
Other existing methods involve adding pixels in digital images or changing the transmission timing of network packets. These are all well-known techniques and easily detected, the researchers said.
“An investigator without the key cannot prove the presence of hidden information,” the authors wrote.
The researchers tested the process on a FAT32 file system, which is accessible by the Windows operating system, Mac OS X and all major Linux distributions. The researchers envisioned using the software to write data onto a portable USB drive. The program will not work to hide data on a Windows 7 laptop, for example, because the operating system cannot be installed on FAT32.
The covert channel approach may cause a small performance degradation on the system but the developers claimed it was not enough to be an issue. If the drive is defragmented, the “hidden” file will no longer be accessible.
Apple fined 150m euros over App Tracking Transparency feature that it says abuses Apple's market…
OpenAI to release customisable open-weight model in coming months as it faces pressure from open-source…
Samsung's Bespoke AI-powered fridge monitors food to create shopping lists, displays TikTok videos, locates misplaced…
Huawei sees 38 percent jump in consumer revenues as its smartphone comeback continues to gather…
In world-first, China approves commercial flights for EHang autonomous passenger drone, paving way for imminent…
Microsoft closes down IoT and AI lab it operated in Shanghai tech district in latest…