Encrypting Virtual Memory
dc.contributor.author | Provos, Niels | en_US |
dc.date.accessioned | 2014-07-18T18:11:53Z | |
dc.date.available | 2014-07-18T18:11:53Z | |
dc.date.issued | 2000-04-25 | en_US |
dc.identifier.citation | N. Provos, "Encrypting Virtual Memory," April 2000. [USENIX Security Symposium, Denver (September 2000).] <http://hdl.handle.net/2027.42/107904> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107904 | |
dc.description.abstract | In modern operating systems, cryptographic file systems can protect confidential data from unauthorized access. However, once an authorized process has accessed data from a cryptographic file system, the data can appear as plaintext in the unprotected virtual memory backing store, even after system shutdown. The solution described in this paper uses swap encryption for processes in possession of confidential data. Volatile encryption keys are chosen randomly, and remain valid only for short periods. Invalid encryption keys are deleted, effectively erasing all data that was encrypted with them. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Encrypting Virtual Memory | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107904/1/citi-tr-00-3.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.