Deniable File Systems
Journalists, aid workers, and democracy advocates all put themselves in harm’s way for the benefit of others. Yet, there is a glaring need for them to store data securely. Typically, private data is protected with encryption that is assumed unbreakable. Yet, if those in a hostile environment are caught with encrypted data, they could be forced to comply through coercion or threats of bodily harm. We propose to secure data in plain sight by hiding it so that the operating system doesn’t even know it’s there. Therefore, the owner can completely deny the existence of the data.
A variety of previously developed systems have been designed in an attempt to address this problem. In the process of navigating the compromises inherent to plausibly deniable storage, each of these systems have demonstrated distinctive “tells” that enable a skilled adversary with knowledge of their design to quickly discover them. Since carrying encrypted files or dedicated hardware can be inherently suspicious, a deniable storage system must be hidden within a publicly visible file system or storage device to maintain plausible deniability. It is highly suspicious if there are visible drivers or firmware, unconventional partitioning schemes, excess unusable space in a file system, or unexplained changes to the disk’s free space. To avoid suspicion, the hidden volume must operate in such a way that the encapsulating file system and operating system are entirely unaware of the hidden file system’s existence, even when faced with a detailed forensic examination.
We take a step toward the goal of applying deniable storage systems to safeguard users by addressing the above requirements with Artifice, a block device that provides functional plausible deniablility for both hidden data and the Artifice driver itself. To access a hidden volume, the user boots into a separate, Artifice-aware operating system through a Linux live USB drive which provides effective isolation from the host OS. Unlike earlier systems, this does not leave behind suspicious drivers on the user’s machine and mitigates the impact of malware and information leakage to the public volume. As the public file system cannot be aware of Artifice’s existence, Artifice must protect itself from damage due to overwrites by public operations. Information Dispersal Algorithms (such as Shamir Secret Sharing) provide Artifice overwrite tolerance through the inclusion of redundant blocks and enable a self repair process whenever the user boots the Artifice-aware OS. The overwrites still occur, but don’t cause irreparable harm.
This system will be the first fully deniable, secure, and tunable steganographic file system. All previous attempts might attain overly strong security guarantees or performance but sacrifice deniability. Our project will push the current understanding of deniable storage and it is our goal to build a fully working system that can survive an intensive forensic examination. This will allow users in the field to have a reliable, secure means of carrying information where the presence of that information does not endanger their lives.
We plan to maintain the project indefinitely through publicly available repositories such as Github, as well as on the Storage and Systems Research Center’s web page.
Status
Prototype:
The Artifice prototype is implemented as a Linux Device Mapper that presents the user with a virtual block device formatted like any other disk. The prototype currently supports hiding in FAT-32 and EXT4 file systems with planned support for NTFS and APFS. The prototype also supports both Shamir Secret Sharing and AONT-RS for obfuscation and error correction. The initial prototype can run simple benchmarks, but a stable release is still a work in progress.
The prototype implementation can be found here.
Red Team Evaluation:
We are currently designing and running experiments to better understand the continually shifting environment in which Artifice resides. The amount and location of random data, free space reuse behavior, SSD TRIM, and write pattern deniability, among other factors, are poorly understood and significantly impact the ability of a deniable storage system to provide sufficient security guarantees.
Publications:
This work has been published in the Freedom and Open Communication on the Internet (FOCI '19) workshop and the Conference on Mass Storage Systems and Technologies (MSST '20). We are in the process of preparing more results for publication.
Faculty
Students
Alumni
Sponsors
Publications
Date | Publication | |
---|---|---|
Jun 1, 2022 |
Eugene Chou,
Lethe: It Won't Take Long to Forget,Masters thesis, June 2022. [Archival Storage] [Secure File and Storage Systems] [Deniable File Systems] |
|
Oct 9, 2021 |
Kyle Fredrickson,
Austen Barker,
Darrell D. E. Long,
A Multiple Snapshot Attack on Deniable Storage Systems,MASCOTS 2021, October 2021, pages 8. [Deniable File Systems] |
|
Oct 1, 2020 |
Austen Barker,
Yash Gupta,
Sabrina Au,
Eugene Chou,
Ethan L. Miller,
Darrell D. E. Long,
Artifice: Data in Disguise,Proceeding of the Conference on Mass Storage Systems and Technologies (MSST '20), October 2020. [Secure File and Storage Systems] [Deniable File Systems] |
|
Aug 13, 2019 |
Austen Barker,
Staunton Sample,
Yash Gupta,
Ana McTaggart,
Ethan L. Miller,
Darrell D. E. Long,
Artifice: A Deniable Steganographic File System,Proceedings of the 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI '19), August 2019. [Secure File and Storage Systems] [Deniable File Systems] |