Secure Deletion File SystemsIn this project we consider techniques to wipe out the data from storage
to prevent the possibility of its future unintended recovery.
File systems can reliably detect events such as deletion, truncation,
and renaming that require secure deletion. At the same time,
file systems have knowledge about the physical location of the data
that requires overwriting. This makes file systems the ideal place
for secure deletion functionality.
Conference and Workshop Papers:
||Name (click for home page)
||Jan 2004 - Dec 2006
||Research Staff Member, Storage and Data Services Research group, IBM T. J. Watson Research Center (Hawthorne, NY)
||Dec 2005 - Mar 2007
||Staff Engineer, Static Application Security Testing, Whitehat Security (Santa Clara, CA)