A survey of confidential data storage and deletion methods

SM Diesburg, AIA Wang - ACM Computing Surveys (CSUR), 2010 - dl.acm.org
As the amount of digital data grows, so does the theft of sensitive data through the loss or
misplacement of laptops, thumb drives, external hard drives, and other electronic storage …

To {FUSE} or not to {FUSE}: Performance of {User-Space} file systems

BKR Vangoor, V Tarasov, E Zadok - 15th USENIX Conference on File …, 2017 - usenix.org
Traditionally, file systems were implemented as part of OS kernels. However, as complexity
of file systems grew, many new file systems began being developed in user space …

PLFS: a checkpoint filesystem for parallel applications

J Bent, G Gibson, G Grider, B McClelland… - Proceedings of the …, 2009 - dl.acm.org
Parallel applications running across thousands of processors must protect themselves from
inevitable system failures. Many applications insulate themselves from failures by …

Sok: Secure data deletion

J Reardon, D Basin, S Capkun - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the
digital world, data is not securely deleted by default; instead, many approaches add secure …

A nine year study of file system and storage benchmarking

A Traeger, E Zadok, N Joukov, CP Wright - ACM Transactions on …, 2008 - dl.acm.org
Benchmarking is critical when evaluating performance, but is especially difficult for file and
storage systems. Complex interactions between I/O devices, caches, kernel daemons, and …

Zero-interaction authentication

MD Corner, BD Noble - Proceedings of the 8th annual international …, 2002 - dl.acm.org
Laptops are vulnerable to theft, greatly increasing the likelihood of exposing sensitive files.
Unfortunately, storing data in a cryptographic file system does not fully address this problem …

{TABLEFS}: Enhancing Metadata {Efficiency} in the Local File System

K Ren, G Gibson - 2013 USENIX Annual Technical Conference (USENIX …, 2013 - usenix.org
File systems that manage magnetic disks have long recognized the importance of sequential
allocation and large transfer sizes for file data. Fast random access has dominated metadata …

Very fast containment of scanning worms, revisited

N Weaver, S Staniford, V Paxson - Malware Detection, 2007 - Springer
Computer worms—malicious, self-propagating programs—represent a significant threat to
large networks. One possible defense, containment, seeks to limit a worm's spread by …

Methods, media and systems for responding to a denial of service attack

A Stavrou, AD Keromytis, J Nieh, V Misra… - US Patent …, 2013 - Google Patents
Methods, media and systems for responding to a Denial of Service (DoS) attack are
provided. In some embodiments, a method includes detecting a DoS attack, migrating one or …

Extension framework for file systems in user space

A Bijlani, U Ramachandran - 2019 USENIX Annual Technical …, 2019 - usenix.org
User file systems offer numerous advantages over their in-kernel implementations, such as
ease of development and better system reliability. However, they incur heavy performance …