Skip to main content
Top
Published in: The Journal of Supercomputing 1/2016

01-01-2016

Data concealments with high privacy in new technology file system

Authors: Fu-Hau Hsu, Min-Hao Wu, Syun-Cheng Ou, Shiuh-Jeng Wang

Published in: The Journal of Supercomputing | Issue 1/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper proposes a new approach, called file concealer (FC), to conceal files in a computer system. FC modifies metadata about a file in NTFS (New Technology File System) to hide the file. Unlike traditional hooking methods which can be easily detected by antivirus software, experimental results show that it is difficult for antivirus software to detect the files hidden by FC. Moreover, to enhance the concealment capability of FC, FC also rearranges the order of some data sectors of a hidden file. As a result, even if another person finds the original sectors used by the hidden file, it is difficult for him to recover the original content of the hidden file. Experimental results show that even data recovery tools cannot restore the content of a hidden file. All information that is required to restore a hidden file is stored in a file, called recovery file hereafter. When a user uses FC to hide a file, the user can specify any file as a host file, such as an image file, to which the recovery file will be appended. As a result, the user can easily restore a hidden file; however, it is difficult for other person to detect or restore the hidden file and the related recovery file.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Butler J, Hoglund G (2004) VICE-catch the hookers. Black Hat USA 61:17–35 Butler J, Hoglund G (2004) VICE-catch the hookers. Black Hat USA 61:17–35
2.
go back to reference Tan CK (2004) Defeating kernel native API hookers by direct service dispatch table restoration. In: Technical Report, Special Interest Group in Security and Information Integrity, pp 1–12 Tan CK (2004) Defeating kernel native API hookers by direct service dispatch table restoration. In: Technical Report, Special Interest Group in Security and Information Integrity, pp 1–12
3.
go back to reference Hoglund G, Butler J (2006) Rootkits: subverting the Windows kernel. Addison-Wesley Professional, book Hoglund G, Butler J (2006) Rootkits: subverting the Windows kernel. Addison-Wesley Professional, book
6.
go back to reference Riley R, Jiang X, Xu D (2009) Multi-aspect profiling of kernel rootkit behavior. In: Proceedings of the 4th ACM European conference on computer systems, pp 47–60 Riley R, Jiang X, Xu D (2009) Multi-aspect profiling of kernel rootkit behavior. In: Proceedings of the 4th ACM European conference on computer systems, pp 47–60
7.
go back to reference Wang YM, Beck D, Vo B, Roussev R, Verbowski C (2005) Detecting stealth software with strider ghostbuster. In: International conference on dependable systems and networks, DSN 2005, Proceedings, pp 368–377 Wang YM, Beck D, Vo B, Roussev R, Verbowski C (2005) Detecting stealth software with strider ghostbuster. In: International conference on dependable systems and networks, DSN 2005, Proceedings, pp 368–377
8.
go back to reference Ramaswamy A (2008) Detecting kernel rootkits. In: Technical Report TR2008-627, Dartmouth College, Computer Science, Hanover, NH Ramaswamy A (2008) Detecting kernel rootkits. In: Technical Report TR2008-627, Dartmouth College, Computer Science, Hanover, NH
9.
go back to reference Srivastava A, Giffin J (2012) Efficient protection of kernel data structures via object partitioning. In: Proceedings of the 28th annual computer security applications conference, pp 429–438 Srivastava A, Giffin J (2012) Efficient protection of kernel data structures via object partitioning. In: Proceedings of the 28th annual computer security applications conference, pp 429–438
10.
go back to reference Martini AI, Zaharis A, Ilioudis C (2008) Detecting and manipulating compressed alternate data streams in a forensics investigation. In: Third international annual workshop on digital forensics and incident analysis, WDFIA’08, pp 53–59 Martini AI, Zaharis A, Ilioudis C (2008) Detecting and manipulating compressed alternate data streams in a forensics investigation. In: Third international annual workshop on digital forensics and incident analysis, WDFIA’08, pp 53–59
11.
go back to reference Means RL (2003) Alternate data streams: out of the shadows and into the light. Retrieved 20:2005 Means RL (2003) Alternate data streams: out of the shadows and into the light. Retrieved 20:2005
14.
go back to reference Dima A (2007) A Win32-based technique for finding and hashing NTFS alternate data streams. In: Proceeding of DoD CyberCrime 2007 Conference, pp 1–14 Dima A (2007) A Win32-based technique for finding and hashing NTFS alternate data streams. In: Proceeding of DoD CyberCrime 2007 Conference, pp 1–14
15.
go back to reference Huebner E, Bem D, Wee CK (2006) Data hiding in the NTFS file system. Digit Investig 3:211–226CrossRef Huebner E, Bem D, Wee CK (2006) Data hiding in the NTFS file system. Digit Investig 3:211–226CrossRef
Metadata
Title
Data concealments with high privacy in new technology file system
Authors
Fu-Hau Hsu
Min-Hao Wu
Syun-Cheng Ou
Shiuh-Jeng Wang
Publication date
01-01-2016
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 1/2016
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-015-1492-y

Other articles of this Issue 1/2016

The Journal of Supercomputing 1/2016 Go to the issue

Premium Partner