REFERENCES
1. Wikipedia contributors. Rubber-hose Cryptanalysis - Wikipedia, The Free Encyclopedia; 2020. Available from https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis. [Last accessed on 27 January 2020].
2. Mull J. How a Syrian Refugee Risked His Life to Bear Witness to Atrocities. Toronto Star Online 2012 March. Available from: https://www.thestar.com/news/world/2012/03/14/how_a_syrian_refugee_risked_his_life_to_bear_witness_to_atrocities.html. [Last accessed on 11 February 2020].
3. Wikipedia contributors. Key Disclosure Law - Wikipedia, The Free Encyclopedia; 2020. Available from: https://en.wikipedia.org/wiki/Key_disclosure_law. [Last accessed on 27 January 2020].
4. McDonald AD, Kuhn MG. StegFS: A Steganographic File System for Linux. In: International Workshop on Information Hiding. Springer; 1999. pp. 463-77.
5. Troncoso C, Diaz C, Dunkelman O, Preneel B. Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. In: International Workshop on Information Hiding. Berlin, Heidelberg: Springer Berlin Heidelberg; 2007. pp. 220-36.
6. Truecrypt Foundation. Truecrypt; 2020. Available from: http://truecrypt.sourceforge.net. [Last accessed on 11 February 2020].
7. Czeskis A, Hilaire DJS, Koscher K, Gribble SD, Kohno T, et al. Defeating Encrypted and Deniable File Systems: TrueCrypt V5.1a and the Case of the Tattling OS and Applications. In: Proceedings of the 3rd Conference on Hot Topics in Security (HOTSEC ’08). Berkeley, CA, USA: USENIX Association; 2008.
8. Goldreich O. Towards a Theory of Software Protection and Simulation by Oblivious RAMs. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing (STOC ’87). ACM; 1987. pp. 182-94.
9. Goldreich O, Ostrovsky R. Software Protection and Simulation on Oblivious RAMs. J ACM 1996;43:431-73.
10. Blass EO, Mayberry T, Noubir G, Onarlioglu K. Toward Robust Hidden Volumes Using Write-Only Oblivious RAM. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS ’14). New York: ACM; 2014. pp. 203-14.
11. Chakraborti A, Chen C, Sion R. DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries. Computing Research Repository (CoRR) 2017;abs/1706.10276. Available from: http://arxiv.org/abs/1706.10276. [Last accessed on 11 February 2020].
13. Anderson R, Needham R, Shamir A. The Steganographic File System In: Aucsmith D, editor. International Workshop on Information Hiding. Berlin, Heidelberg: Springer Berlin Heidelberg; 1998. pp. 73-82.
14. Pang H, Tan K, Zhou X. StegFS: A Steganographic File System. In: Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405) . pp. 657-67.
15. Hand S, Roscoe T. Mnemosyne: Peer-to-Peer Steganographic Storage. In: Peer-to-Peer Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2002. pp. 130-40.
16. Rabin MO. Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance. J ACM 1989;36:335-48.
17. Chen C, Chakraborti A, Sion R. PDDM: An Efficient Locality-preserving Block Device Mapper with Plausible Deniability. Proceedings on Privacy Enhancing Technologies 2019;2019:153-71.
18. Skillen A, Mannan M. On Implementing Deniable Storage Encryption for Mobile Devices. In: 20th Annual Network & Distributed System Security Symposium; 2013. Available from: https://spectrum.library.concordia.ca/975074/. [Last accessed on 11 February 2020].
19. Peters T, Gondree MA, Peterson ZNJ. DEFY: A Deniable, Encrypted File System for Log-Structured Storage. In: 22nd Annual Network and Distributed System Security Symposium, (NDSS). The Internet Society; 2015.
20. SignalApp. Github: WhisperYAFFS; 2011. Available from: https://github.com/signalapp/WhisperYAFFS/wiki. [Last accessed on 11 February 2020].
21. Zuck A, Shriki U, Porter DE, Tsafrir D. Preserving Hidden Data with an Ever-Changing Disk. In: Proceedings of the 16th Workshop on Hot Topics in Operating Systems (HotOS ’17). New York: ACM; 2017. pp. 50-5.
22. Barker A, Sample S, Gupta Y, McTaggart A, Miller EL, et al. Artifice: A Deniable Steganographic File System. In: 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19). Santa Clara: USENIX Association; 2019.
23. Chang B, Wang Z, Chen B, Zhang F. MobiPluto: File System Friendly Deniable Storage for Mobile Devices. In: Proceedings of the 31st Annual Computer Security Applications Conference. ACSAC 2015 New York: ACM; 2015. pp. 381-90.
24. Kerckhoff A. La Cryptographie Militaire. Journal des Sciences Militaires 1883;IX.
25. Zhong R. China Snares Tourists’ Phones in Surveillance Dragnet by Adding Secret App 2019 July. Available from: https://www.nytimes.com/2019/07/02/technology/china-xinjiang-app.html. [Last accessed on 11 February 2020].
26. Edge J. Thwarting the Evil Maid. LWNnet 2015 July. Available from: https://lwn.net/Articles/651021/. [Last accessed on 11 February 2020].
27. Idrassi M. Veracrypt; 2020. Available from: https://www.veracrypt.fr/en/Home.html. [Last accessed on 11 February 2020].
28. Resch JK, Plank JS. AONT-RS: Blending Security and Performance in Dispersed Storage Systems. In: Proceedings of the 9th USENIX Conference on File and Stroage Technologies. FAST’11. USA: USENIX Association; 2011. p. 14.
29. Rivest RL. All-or-nothing encryption and the package transform. In: Biham E, editor. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg; 1997. pp. 210-18.
30. Reed IS, Solomon G. Polynomial Codes Over Certain Finite Fields. Journal of the Society for Industrial and Applied Mathematics 1960;8:300-4.
31. Broz M. dm-crypt; 2020. Available from: https://gitlab.com/cryptsetup/cryptsetup. [Last accessed on 11 February 2020].
32. Rosenblum M, Ousterhout JK. The Design and Implementation of a Log-Structured File System. ACM Transactions on Computer Systems 1992;10:26-52.
33. Zuck A, Li Y, Bruck J, Porter DE, Tsafrir D. Stash in a Flash. In: 16th USENIX Conference on File and Storage Technologies (FAST 18). Oakland, CA: USENIX Association; 2018. pp. 169-88.
34. Chen C, Chakraborti A, Sion R. INFUSE: Invisible plausibly-deniable file system for NAND flash. Proceedings on Privacy Enhancing Technologies 2020. pp. 239-54.
35. Aaron Griffin and others. The Arch Linux Wiki: Solid state drive; 2020. Available from: https://wiki.archlinux.org/index.php/Solid_state_drive. [Last accessed on 11 February 2020].
36. The Debian Project. Debian Wiki: SSD Optimization; 2020. https://wiki.debian.org/SSDOptimization. [Last accessed on 11 February 2020].
37. Broz M, Matyás V. The TrueCrypt On-Disk Format–An Independent View. IEEE Security Privacy 2014;12:74-77.
38. Bjørling M. From Open-Channel SSDs to Zoned Namespaces. Boston, MA: USENIX Association; 2019. VAULT-2019: 1st USENIX Conference on Linux Storage and Filesystems
39. Linux Documentation Maintainers. The Linux Kernel user’s and Administrator’s Guide: Device Mapper: dm-zoned. Available from: https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-zoned.html. [Last accessed on 11 February 2020].
40. Lee C, Sim D, Hwang J, Cho S. F2FS: A New File System for Flash Storage. In: 13th USENIX Conference on File and Storage Technologies (FAST 15). Santa Clara, CA: USENIX Association; 2015. pp. 273-86.
41. Gray J. Empirical Measurements of Disk Failure Rates and Error Rates; 2005. Available from: https://www.microsoft.com/en-us/research/publication/empirical-measurements-of-disk-failure-rates-and-error-rates/ [Last accessed on 27 January 2020].
42. Silverstone D. Library for Shamir Secret Sharing in Galois Field 2**8; 2006. Available from: https://github.com/jcushman/libgfshare. [Last accessed on 27 January 2020].
43. Google. CityHash, A Family of Hash Functions for Strings; 2013. Available from: https://code.google.com/p/cityhash. [Last accessed on 14 May 2021].
44. Plank JS, Greenan KM, Miller EL. Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions. In: FAST-2013: 11th Usenix Conference on File and Storage Technologies. San Jose, CA: USENIX Association; 2013.
45. Knuth DE. In: The Art of Computer Programming, volume 2 (3rd ed.): Seminumerical Algorithms. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc.; 1997. p. 505.
46. Throckmorton Z. USB 3.0 Flash Drive Roundup. Anandtech 2011 July. Available from: https://www.anandtech.com/show/4523/usb-30-flash-drive-roundup/3. [Last accessed on 11 February 2020].