Protected Storage

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 48 Experts worldwide ranked by ideXlab platform

Liviu Itoafa - One of the best experts on this subject based on the ideXlab platform.

  • Live Forensics – Extracting Credentials on Windows and Linux Systems
    2016
    Co-Authors: Liviu Itoafa
    Abstract:

    Abstract: ’Post-mortem ’ analysis of a system can be greatly simplified if the correct information is gathered in the live analysis stage. In this paper I’ve described Windows ’ data protection APIs available for developers, some simplified versions of the API (LSA Secrets, Protected Storage), different methods used by applications to store their passwords safely and comparisons between them. As an example, I’ve built tools to dump passwords saved by browsers (Chrome, IE, Firefox) and an extractor of the login password (if available) from the registry. The basic concepts of how passwords may be stored apply to majority of applications that run on Windows and store passwords (Protected or not) and understanding this makes possible recovery of other credentials also (messaging software, mail clients...). On the Linux side, I’ve analyzed a general method of storing passwords – keyrings, and the methods adopted by Chrome browser, and built extraction command line tools for both of them, in the form of a python script and a C++ application

  • live forensics extracting credentials on windows and linux systems
    Journal of Mobile Embedded and Distributed Systems, 2012
    Co-Authors: Liviu Itoafa
    Abstract:

    ’Post-mortem’ analysis of a system can be greatly simplified if the correct information is gathered in the live analysis stage. In this paper I’ve described Windows’ data protection APIs available for developers, some simplified versions of the API (LSA Secrets, Protected Storage), different methods used by applications to store their passwords safely and comparisons between them.  As an example, I’ve built tools to dump passwords saved by browsers (Chrome, IE, Firefox) and an extractor of the login password (if available) from the registry. The basic concepts of how passwords may be stored apply to majority of applications that run on Windows and store passwords (Protected or not) and understanding this makes possible recovery of other credentials also (messaging software, mail clients ...). On the Linux side, I’ve analyzed a general method of storing passwords – keyrings , and the methods adopted by Chrome browser, and built extraction command line tools for both of them, in the form of a python script and a C++ application.

Irene Damico - One of the best experts on this subject based on the ideXlab platform.

  • decoherence Protected Storage of exciton qubits through ultrafast multipulse control
    Physical Review B, 2008
    Co-Authors: Thomas E Hodgson, Lorenza Viola, Irene Damico
    Abstract:

    We quantitatively investigate the usefulness and viability of the scheme developed by Viola and Lloyd [Phys. Rev. A 58, 2733 (1998)] to control dephasing in the context of exciton-based quantum computation with self-assembled quantum dots. We demonstrate that optical coherence of a confined exciton qubit exposed to phonon-induced dephasing can be substantially enhanced through the application of a simple periodic sequence of control pulses. The shape of the quantum dot has a significant effect on the dephasing properties. Remarkably, we find that quantum dots with parameters optimized for implementing quantum computation are among the most susceptible to dephasing, yet periodic decoupling is most efficient for exactly that type of dot. We also show that the presence of an electric field, which is a necessary ingredient for many exciton-based quantum computing schemes, may further increase the control efficiency. Our results suggest that dynamical decoupling may be a method of choice for robust Storage of exciton qubits during idle stages of quantum algorithms.

Dengguo Feng - One of the best experts on this subject based on the ideXlab platform.

  • type based analysis of Protected Storage in the tpm
    International Conference on Information and Communication Security, 2013
    Co-Authors: Jianxiong Shao, Dengguo Feng
    Abstract:

    The Trusted Platform Module (TPM) is designed to enable trustworthy computation and communication over open networks. The TPM provides a way to store cryptographic keys and other sensitive values in its shielded memory and act as Root of Trust for Storage (RTS). The TPM interacts with applications via a predefined set of commands (an API). In this paper, we give an abstraction model for the TPM 2.0 specification concentrating on Protected Storage part. With identification and formalization of their secrecy properties, we devise a type system with asymmetric cryptographic primitives to statically enforce and prove their security.

Thomas E Hodgson - One of the best experts on this subject based on the ideXlab platform.

  • decoherence Protected Storage of exciton qubits through ultrafast multipulse control
    Physical Review B, 2008
    Co-Authors: Thomas E Hodgson, Lorenza Viola, Irene Damico
    Abstract:

    We quantitatively investigate the usefulness and viability of the scheme developed by Viola and Lloyd [Phys. Rev. A 58, 2733 (1998)] to control dephasing in the context of exciton-based quantum computation with self-assembled quantum dots. We demonstrate that optical coherence of a confined exciton qubit exposed to phonon-induced dephasing can be substantially enhanced through the application of a simple periodic sequence of control pulses. The shape of the quantum dot has a significant effect on the dephasing properties. Remarkably, we find that quantum dots with parameters optimized for implementing quantum computation are among the most susceptible to dephasing, yet periodic decoupling is most efficient for exactly that type of dot. We also show that the presence of an electric field, which is a necessary ingredient for many exciton-based quantum computing schemes, may further increase the control efficiency. Our results suggest that dynamical decoupling may be a method of choice for robust Storage of exciton qubits during idle stages of quantum algorithms.

Michal R Wrobel - One of the best experts on this subject based on the ideXlab platform.

  • operating system security by integrity checking and recovery using write Protected Storage
    Iet Information Security, 2014
    Co-Authors: J Kaczmarek, Michal R Wrobel
    Abstract:

    An integrity checking and recovery (ICAR) system is presented here, which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write-Protected Storage to eliminate the threat of unauthorised modification. A buffering mechanism was designed and implemented in the system to increase operation performance. Additionally, the system supplies user tools for cryptographic hash generation and security database management. The system is implemented as a kernel extension, compliant with the Linux security model. Experimental evaluation of the system was performed and showed an approximate 10% performance degradation in secured file access compared to regular access.