TY - STD TI - Amazon: New SSD-Backed Elastic Block Storage (2016). Retrieved December 17, 2017, from https://aws.amazon.com/blogs/aws/new-ssd-backed-elastic-block-storage/. UR - https://aws.amazon.com/blogs/aws/new-ssd-backed-elastic-block-storage/ ID - ref1 ER - TY - STD TI - Anderson, R, Needham R, Shamir A (1998) The steganographic file system In: International Workshop on Information Hiding, 73–82.. Springer. ID - ref2 ER - TY - STD TI - Apple: Use filevault to encrypt the startup disk on your mac (2017). Retrieved December 17, 2017, from https://support.apple.com/en-us/HT204837. UR - https://support.apple.com/en-us/HT204837 ID - ref3 ER - TY - STD TI - Assange, J, Weinmann RP, Dreyfus S (2012) Rubberhose: Cryptographically deniable transparent disk encryption system. Retrieved December 17, 2017, from https://web.archive.org/web/20120716034441/http://marutukku.org/. UR - https://web.archive.org/web/20120716034441/http://marutukku.org/ ID - ref4 ER - TY - JOUR AU - Bajaj, S. AU - Chakraborti, A. AU - Sion, R. PY - 2016 DA - 2016// TI - Practical foundations of history independence. Information Forensics and Security JO - IEEE Transactions on VL - 11 ID - Bajaj2016 ER - TY - STD TI - Bajaj, S, Sion R (2013) Ficklebase: Looking into the future to erase the past In: Data Engineering (ICDE) 2013 IEEE 29th International Conference on, 86–97.. IEEE. ID - ref6 ER - TY - STD TI - Bajaj, S, Sion R (2013) Hifs: History independence for file systems In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 1285–1296.. ACM. ID - ref7 ER - TY - STD TI - Ballard Spahr LLP: State and local governments move swiftly to sue equifax (2017). Retrieved December 17, 2017, from https://www.natlawreview.com/article/state-and-local-governments-move-swiftly-to-sue-equifax. UR - https://www.natlawreview.com/article/state-and-local-governments-move-swiftly-to-sue-equifax ID - ref8 ER - TY - STD TI - Bauer, S, Priyantha NB (2001) Secure data deletion for linux file systems In: Usenix Security Symposium. Volume 174. ID - ref9 ER - TY - STD TI - Blass, EO, Mayberry T, Noubir G, Onarlioglu K (2014) Toward robust hidden volumes using write-only oblivious ram In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 203–214.. ACM. ID - ref10 ER - TY - STD TI - Boneh, D, Lipton RJ (1996) A revocable backup system In: USENIX Security Symposium, 91–96. ID - ref11 ER - TY - STD TI - Braga, A, Colito A (2014) Adding Secure Deletion to an Encrypted File System on Android Smartphones In: SECURWARE 2014, The Eighth International Conference on Emerging Security Information, Systems and Technologies, 106–110. ID - ref12 ER - TY - JOUR AU - Breeuwsma, M. AU - De Jongh, M. AU - Klaver, C. AU - Van Der Knijff, R. AU - Roeloffs, M. PY - 2007 DA - 2007// TI - Forensic data recovery from flash memory JO - Small Scale Digit Device Forensic J VL - 1 ID - Breeuwsma2007 ER - TY - STD TI - Cai, Y, Luo Y, Ghose S, Mutlu O (2015) Read disturb errors in mlc nand flash memory: Characterization, mitigation, and recovery In: Dependable Systems and Networks (DSN), 2015 45th Annua IEEE/IFIP International Conference on, 438–449.. IEEE. ID - ref14 ER - TY - STD TI - Canetti, R, Dwork C, Naor M, Ostrovsky R (1997) Deniable encryption In: Annual International, Cryptology Conference, 90–104.. Springer. ID - ref15 ER - TY - STD TI - Cbsnews: Apple’s celebrity icloud leak probably has mundane causes (2014). Retrieved December 17, 2017, from https://www.cbsnews.com/news/apples-celebrity-icloud-leak-probably-has-mundane-causes/. UR - https://www.cbsnews.com/news/apples-celebrity-icloud-leak-probably-has-mundane-causes/ ID - ref16 ER - TY - STD TI - Chakraborti, A, Chen C, Sion R (2016) Poster: Datalair: A storage block device with plausible deniability. ACM. ID - ref17 ER - TY - JOUR AU - Chakraborti, A. AU - Chen, C. AU - Sion, R. PY - 2017 DA - 2017// TI - Datalair: Efficient block storage with plausible deniability against multi-snapshot adversaries JO - Proc Priv Enhanc Technol VL - 3 ID - Chakraborti2017 ER - TY - JOUR AU - Chang, B. AU - Cheng, Y. AU - Chen, B. AU - Zhang, F. AU - Zhu, W. T. AU - Li, Y. AU - Wang, Z. PY - 2018 DA - 2018// TI - User-friendly deniable storage for mobile devices JO - Comput Secur VL - 72 UR - https://doi.org/10.1016/j.cose.2017.09.005 DO - 10.1016/j.cose.2017.09.005 ID - Chang2018 ER - TY - STD TI - Chang, B, Wang Z, Chen B, Zhang F (2015) Mobipluto: File system friendly deniable storage for mobile devices In: Proceedings of the 31st Annual Computer Security Applications Conference, 381–390.. ACM. ID - ref20 ER - TY - STD TI - Chang, B, Zhang F, Chen B, Li Y, Zhu WT, Tian Y, Wang Z, Ching A (2018) Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices In: Proceedings of the 48th IEEE/IFIP International Conference on Dependable Systems and Networks. ID - ref21 ER - TY - STD TI - Chen, B, Jia S, Xia L, Liu P (2016) Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media In: Proceedings of the 32nd Annual Conference on Computer Security Applications, 496–507.. ACM. ID - ref22 ER - TY - STD TI - Chen, B, Sion R (2015) Hiflash: A history independent flash device. arXiv preprint arXiv:1511.05180. ID - ref23 ER - TY - STD TI - Congress, US (1996) Health Insurance Portability and Accountability Act. Retrieved November 9, 2017, from http://www.hhs.gov/ocr/privacy/index.html. UR - http://www.hhs.gov/ocr/privacy/index.html ID - ref24 ER - TY - STD TI - Congress, US (1999) Gramm-Leach-Bailey Act. Retrieved November 9, 2017, from http://www.gpo.gov/fdsys/pkg/PLAW-106publ102/pdf/PLAW-106publ102.pdf. UR - http://www.gpo.gov/fdsys/pkg/PLAW-106publ102/pdf/PLAW-106publ102.pdf ID - ref25 ER - TY - STD TI - Czeskis, A, Hilaire DJS, Koscher K, Gribble SD, Kohno T, Schneier B (2008) Defeating encrypted and deniable file systems: Truecrypt v5. 1a and the case of the tattling os and applications In: HotSec. ID - ref26 ER - TY - STD TI - Durak, B (2006) wipe - Linux man page. Retrieved December 17, 2017, from https://linux.die.net/man/1/wipe. UR - https://linux.die.net/man/1/wipe ID - ref27 ER - TY - STD TI - Diesburg, S, Meyers C, Stanovich M, Mitchell M, Marshall J, Gould J, Wang AIA, Kuenning G (2012) Trueerase: Per-file secure deletion for the storage data path In: Proceedings of the 28th, Annual Computer Security Applications Conference, 439–448.. ACM. ID - ref28 ER - TY - STD TI - Dürmuth, M, Freeman DM (2011) Deniable encryption with negligible detection probability: An interactive construction In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, 610–626.. Springer. ID - ref29 ER - TY - JOUR AU - Frèche, G. AU - Bloch, M. R. AU - Barret, M. PY - 2017 DA - 2017// TI - Polar codes for covert communications over asynchronous discrete memoryless channels JO - Entropy VL - 20 UR - https://doi.org/10.3390/e20010003 DO - 10.3390/e20010003 ID - Frèche2017 ER - TY - JOUR AU - Garfinkel, S. L. AU - Shelat, A. PY - 2003 DA - 2003// TI - Remembrance of data passed: A study of disk sanitization practices JO - IEEE Secur Priv VL - 99 UR - https://doi.org/10.1109/MSECP.2003.1176992 DO - 10.1109/MSECP.2003.1176992 ID - Garfinkel2003 ER - TY - STD TI - Geambasu, R, Kohno T, Levy AA, Levy HM (2009) Vanish: Increasing data privacy with self-destructing data In: USENIX Security Symposium, 299–316. ID - ref32 ER - TY - STD TI - GEEP EDS LLC: Darik’s Boot and Nuke (2017). Retrieved December 17, 2017, from http://www.dban.org/. UR - http://www.dban.org/ ID - ref33 ER - TY - JOUR AU - Goldreich, O. AU - Ostrovsky, R. PY - 1996 DA - 1996// TI - Software protection and simulation on oblivious rams JO - J ACM (JACM) VL - 43 UR - https://doi.org/10.1145/233551.233553 DO - 10.1145/233551.233553 ID - Goldreich1996 ER - TY - STD TI - Gutmann, P (1996) Secure deletion of data from magnetic and solid-state memory In: Proceedings of the Sixth USENIX Security Symposium, San Jose, CA. Volume 14. ID - ref35 ER - TY - JOUR AU - Halderman, J. A. AU - Schoen, S. D. AU - Heninger, N. AU - Clarkson, W. AU - Paul, W. AU - Calandrino, J. A. AU - Feldman, A. J. AU - Appelbaum, J. AU - Felten, E. W. PY - 2009 DA - 2009// TI - Lest we remember: cold-boot attacks on encryption keys JO - Commun ACM VL - 52 UR - https://doi.org/10.1145/1506409.1506429 DO - 10.1145/1506409.1506429 ID - Halderman2009 ER - TY - STD TI - Han, J, Pan M, Gao D, Pang H (2010) A multi-user steganographic file system on untrusted shared storage In: Proceedings of the 26th Annual Computer Security Applications Conference, 317–326.. ACM. ID - ref37 ER - TY - STD TI - Howlader, J, Basu S (2009) Sender-side public key deniable encryption scheme In: Advances in Recent Technologies in Communication and Computing, 2009. ARTCom’09. International Conference on, 9–13.. IEEE. ID - ref38 ER - TY - STD TI - Hu, J, Yan S, Zhou X, Shu F, Wang J (2017) Covert Communication in Wireless Relay Networks In: GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 1–6. ID - ref39 ER - TY - JOUR AU - Ibrahim, M. H. PY - 2009 DA - 2009// TI - Receiver-deniable public-key encryption JO - IJ Netw Secur VL - 8 ID - Ibrahim2009 ER - TY - STD TI - Incits: Scsi storage interfaces (2016). Retrieved December 17, 2017, from http://www.t10.org/index.html. UR - http://www.t10.org/index.html ID - ref41 ER - TY - STD TI - Intel: Intel software guard extensions (2017). Retrieved December 19, 2017, from https://software.intel.com/en-us/sgx. UR - https://software.intel.com/en-us/sgx ID - ref42 ER - TY - STD TI - Intel Corporation: Intel Solid-State Drive Optimizer (2009). Retrieved December 17, 2017, from http://download.intel.com/design/flash/nand/mainstream/IntelSSDOptimizerWhitePaper.pdf. UR - http://download.intel.com/design/flash/nand/mainstream/IntelSSDOptimizerWhitePaper.pdf ID - ref43 ER - TY - STD TI - Jagdmann, D (2015) srm - Linux man page. Retrieved December 17, 2017, from https://www.mankier.com/1/srm. UR - https://www.mankier.com/1/srm ID - ref44 ER - TY - STD TI - Jia, S, Xia L, Chen B, Liu P (2016) Nfps: Adding undetectable secure deletion to flash translation layer In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 305–315.. ACM. ID - ref45 ER - TY - STD TI - Jia, S, Xia L, Chen B, Liu P (2017) Deftl: Implementing plausibly deniable encryption in flash translation layer In: Proceedings of the 24th ACM conference on Computer and communications security.. ACM. ID - ref46 ER - TY - STD TI - Joukov, N, Papaxenopoulos H, Zadok E (2006) Secure deletion myths, issues, and solutions. ACM Work Storage Secur Survivability:61–66. ID - ref47 ER - TY - STD TI - Joukov, N, Zadok E (2005) Adding secure deletion to your favorite file system In: Third IEEE International Security in Storage Workshop (SISW’05), 8.. IEEE. ID - ref48 ER - TY - STD TI - Klonowski, M, Kubiak P, Kutyłowski M (2008) Practical deniable encryption. SOFSEM 2008: Theory Pract Comput Sci:599–609. ID - ref49 ER - TY - JOUR AU - Lee, B. AU - Son, K. AU - Won, D. AU - Kim, S. PY - 2011 DA - 2011// TI - Secure data deletion for usb flash memory JO - J Inf Sci Eng VL - 27 ID - Lee2011 ER - TY - STD TI - Lee, C, Sim D, Hwang JY, Cho S (2015) F2fs: a new file system for flash storage. Usenix Conf File Storage Technol:273–286. ID - ref51 ER - TY - STD TI - Lee, J, Heo J, Cho Y, Hong J, Shin SY (2008) Secure deletion for nand flash file system In: Proceedings of the 2008 ACM symposium on Applied computing, 1710–1714.. ACM. ID - ref52 ER - TY - JOUR AU - Lee, J. AU - Yi, S. AU - Heo, J. AU - Park, H. AU - Shin, S. Y. AU - Cho, Y. PY - 2010 DA - 2010// TI - An efficient secure deletion scheme for flash file systems JO - J Inf Sci Eng VL - 26 ID - Lee2010 ER - TY - STD TI - LSoft Technologies Inc: Active@ KillDisk (2017). Retrieved December 17, 2017, from http://www.killdisk.com/. UR - http://www.killdisk.com/ ID - ref54 ER - TY - STD TI - McDonald, AD, Kuhn MG (2000) Stegfs: A steganographic file system for linux In: Information Hiding, 463–477.. Springer. ID - ref55 ER - TY - STD TI - Memory Technology Devices: UBIFS (2015). Retrieved December 17, 2017, from http://www.linux-mtd.infradead.org/doc/ubifs.html. UR - http://www.linux-mtd.infradead.org/doc/ubifs.html ID - ref56 ER - TY - STD TI - Meng, B, Wang Jq (2009) A receiver deniable encryption scheme In: International Symposium on Information Processing (ISIP ’09). ID - ref57 ER - TY - JOUR AU - Meng, B. AU - Wang, J. PY - 2010 DA - 2010// TI - An efficient receiver deniable encryption scheme and its applications JO - JNW VL - 5 UR - https://doi.org/10.4304/jnw.5.6.683-690 DO - 10.4304/jnw.5.6.683-690 ID - Meng2010 ER - TY - STD TI - Microsoft: Bitlocker (2017). Retrieved December 17, 2017, from https://docs.microsoft.com/en-us/windows/device-security/bitlocker/bitlocker-overview. UR - https://docs.microsoft.com/en-us/windows/device-security/bitlocker/bitlocker-overview ID - ref59 ER - TY - STD TI - Min, C, Kim K, Cho H, Lee SW, Eom YI (2012) Sfs: random write considered harmful in solid state drives In: FAST, 12. ID - ref60 ER - TY - JOUR AU - O’Neill, A. AU - Peikert, C. AU - Waters, B. PY - 2011 DA - 2011// TI - Bi-deniable public-key encryption JO - Adv Cryptol–CRYPTO VL - 2011 ID - O’Neill2011 ER - TY - STD TI - Pang, H, Tan KL, Zhou X (2003) Stegfs: A steganographic file system In: Data Engineering, 2003. Proceedings. 19th International Conference on, 657–667.. IEEE. ID - ref62 ER - TY - JOUR AU - Pang, H. AU - Tan, K. L. AU - Zhou, X. PY - 2004 DA - 2004// TI - Steganographic schemes for file system and b-tree JO - IEEE Trans Knowl Data Eng VL - 16 UR - https://doi.org/10.1109/TKDE.2004.15 DO - 10.1109/TKDE.2004.15 ID - Pang2004 ER - TY - STD TI - Perlman, R (2005) The Ephemerizer: Making Data Disappear In: Journal of Information System Security.. Citeseer. ID - ref64 ER - TY - STD TI - Perlman, R (2005) File system design with assured delete In: Third IEEE International Security in Storage Workshop (SISW’05), 6.. IEEE. ID - ref65 ER - TY - STD TI - Peters, TM, Gondree MA, Peterson ZN (2015) DEFY: A deniable, encrypted file system for log-structured storage In: 22th Annual Network and Distributed System Security Symposium.. NDSS. ID - ref66 ER - TY - STD TI - Peterson, ZN, Burns RC, Herring J, Stubblefield A, Rubin AD (2005) Secure deletion for a versioning file system In: FAST. Volume 5, 143–154. ID - ref67 ER - TY - STD TI - Plumb, C (2010) shred 1 - Linux man page. Retrieved December 17, 2017, from https://linux.die.net/man/1/shred. UR - https://linux.die.net/man/1/shred ID - ref68 ER - TY - JOUR AU - Qin, Y. AU - Tong, W. AU - Liu, J. AU - Zhu, Z. PY - 2013 DA - 2013// TI - Smsd: A smart secure deletion scheme for ssds JO - J Converg VL - 4 ID - Qin2013 ER - TY - STD TI - Kissel, R, Scholl M, S S, Li X (2006) Guidelines for Media Sanitization. Retrieved December 17, 2017, from http://ws680.nist.gov/publication/get_pdf.cfm?pub_id=50819. UR - http://ws680.nist.gov/publication/get_pdf.cfm?pub_id=50819 ID - ref70 ER - TY - STD TI - Reardon, J, Basin D, Capkun S (2013) Sok: Secure data deletion In: Security and Privacy (SP), 2013 IEEE Symposium on, 301–315.. IEEE. ID - ref71 ER - TY - STD TI - Reardon, J, Capkun S, Basin D (2012) Data node encrypted file system: Efficient secure deletion for flash memory In: Proceedings of the 21st USENIX conference on Security symposium, USENIX Association, 17–17. ID - ref72 ER - TY - STD TI - Reardon, J, Marforio C, Capkun S, Basin D (2012) Secure deletion on log-structured file systems. ASIACCS 2012. ID - ref73 ER - TY - STD TI - Reardon, J, Ritzdorf H, Basin D, Capkun S (2013) Secure data deletion from persistent media In: ACM Sigsac Conference on, Computer & Communications Security, 271–284. ID - ref74 ER - TY - STD TI - Robust Flash Storage: YAFFS (2002). Retrieved December 17, 2017, from http://www.yaffs.net/yaffs-overview. UR - http://www.yaffs.net/yaffs-overview ID - ref75 ER - TY - STD TI - Roche, DS, Aviv A, Choi SG, Mayberry T (2017) Deterministic, stash-free write-only oram In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 507–521.. ACM. ID - ref76 ER - TY - STD TI - Sarbanes, USP, Oxley URMG (2002) Sarbanes-Oxley Act. Retrieved November 9, 2017, from http://www.sec.gov/about/laws.shtml#sox2002. UR - http://www.sec.gov/about/laws.shtml#sox2002 ID - ref77 ER - TY - STD TI - Skillen, A. (2013) Deniable storage encryption for mobile devices. PhD thesis. Concordia University. ID - ref78 ER - TY - STD TI - Skillen, A, Mannan M (2013) On implementing deniable storage encryption for mobile devices. ID - ref79 ER - TY - JOUR AU - Skillen, A. AU - Mannan, M. PY - 2014 DA - 2014// TI - Mobiflage: Deniable storage encryptionfor mobile devices JO - IEEE Trans Dependable Secure Comput VL - 11 UR - https://doi.org/10.1109/TDSC.2013.56 DO - 10.1109/TDSC.2013.56 ID - Skillen2014 ER - TY - STD TI - Sourceforge: FreeOTFE A free “on-the-fly” transparent disk encryption program for PC and PDAs (2017). Retrieved December 19, 2017, Project website: https://sourceforge.net/projects/freeotfe.mirror/. UR - https://sourceforge.net/projects/freeotfe.mirror/ ID - ref81 ER - TY - STD TI - Sourceware: Jffs2 (2003). Retrieved November 9, 2017, from https://www.sourceware.org/jffs2/. UR - https://www.sourceware.org/jffs2/ ID - ref82 ER - TY - STD TI - SQLite: Pragma statements (2017). Retrieved December 17, 2017, from http://www.sqlite.org/pragma.html#pragma_secure_delete. UR - http://www.sqlite.org/pragma.html#pragma_secure_delete ID - ref83 ER - TY - STD TI - Stahlberg, P, Miklau G, Levine BN (2007) Threats to privacy in the forensic analysis of database systems. ACM SIGMOD conf Manag data:91–102. ID - ref84 ER - TY - STD TI - Stefanov, E, Van Dijk M, Shi E, Fletcher C, Ren L, Yu X, Devadas S (2013) Path oram: an extremely simple oblivious ram protocol In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 299–310.. ACM. ID - ref85 ER - TY - JOUR AU - Sun, K. AU - Choi, J. AU - Lee, D. AU - Noh, S. H. PY - 2008 DA - 2008// TI - Models and design of an adaptive hybrid scheme for secure deletion of data in consumer electronics. Consumer Electronics JO - IEEE Trans VL - 54 ID - Sun2008 ER - TY - BOOK AU - Swanson, S. AU - Wei, M. PY - 2010 DA - 2010// TI - Safe: Fast, verifiable sanitization for ssds PB - University of California-San Diego CY - San Diego, CA ID - Swanson2010 ER - TY - JOUR AU - Tang, Y. AU - Lee, P. P. AU - Lui, J. AU - Perlman, R. PY - 2012 DA - 2012// TI - Secure overlay cloud storage with access control and assured deletion. Dependable and Secure Computing JO - IEEE Trans VL - 9 ID - Tang2012 ER - TY - STD TI - Team work systems: Advanced technology attachment (2017). Retrieved December 17, 2017, from https://teamws.com/glossary/ata-advanced-technology-attachment/. UR - https://teamws.com/glossary/ata-advanced-technology-attachment/ ID - ref89 ER - TY - STD TI - Thornber, JThin provisioning tools. https://github.com/jthornber/thin-provisioning-tools. UR - https://github.com/jthornber/thin-provisioning-tools ID - ref90 ER - TY - STD TI - Troncoso, C, Diaz C, Dunkelman O, Preneel B (2007) Traffic analysis attacks on a continuously-observable steganographic file system In: International Workshop on Information Hiding, 220–236.. Springer. ID - ref91 ER - TY - STD TI - TrueCrypt: Free open source on-the-fly disk encryption software.version 7.1a (2012). Retrieved December 19, 2017, Project website: http://www.truecrypt.org/. UR - http://www.truecrypt.org/ ID - ref92 ER - TY - STD TI - Varun, S, Shibin K, Anoop S, Vivek K (2017) Magikfs - The Steganographic Filesystem On Linux. Retrieved December 19, 2017, Project website: http://magikfs.sourceforge.net/. UR - http://magikfs.sourceforge.net/ ID - ref93 ER - TY - STD TI - Wang, Z, Murmuria R, Stavrou A (2012) Implementing and Optimizing an Encryption Filesystem on Android In: IEEE International Conference on Mobile Data Management, 52–62. ID - ref94 ER - TY - STD TI - Wei, MYC, Grupp LM, Spada FE, Swanson S (2011) Reliably erasing data from flash-based solid state drives In: FAST. Volume 11, 8–8. ID - ref95 ER - TY - STD TI - Wikipedia: Timeline of quantum computing (2018). Retrieved December 19, 2017, from https://en.wikipedia.org/wiki/Timeline_of_quantum_computing. UR - https://en.wikipedia.org/wiki/Timeline_of_quantum_computing ID - ref96 ER - TY - STD TI - Yu, X, Chen B, Wang Z, Chang B, Zhu WT, Jing J (2014) Mobihydra: Pragmatic and multi-level plausibly deniable encryption storage for mobile devices In: Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14 2014. Proceedings, 555–567. ID - ref97 ER - TY - STD TI - Zarras, A, Kohls K, Dürmuth M, Pöpper C (2016) Neuralyzer: Flexible expiration times for the revocation of online data In: Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 14–25.. ACM. ID - ref98 ER - TY - STD TI - Zhao, L, Mannan M (2015) Gracewipe: Secure and verifiable deletion under coercion In: Network and Distributed System Security Symposium. ID - ref99 ER - TY - STD TI - Zhou, X, Pang H, Tan KL (2004) Hiding data accesses in steganographic file system In: Data Engineering, 2004. Proceedings. 20th International Conference on, 572–583.. IEEE. ID - ref100 ER - TY - STD TI - Zuck, A, Shriki U, Porter DE, Tsafrir D (2017) Preserving hidden data with an ever-changing disk. Work Hot Top Oper Syst. ID - ref101 ER -