{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:03:54Z","timestamp":1772042634861,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National 973 Program","award":["2014CB340603"],"award-info":[{"award-number":["2014CB340603"]}]},{"name":"Strategy Pilot Project of Chinese Academy of Sciences","award":["XDA06010702"],"award-info":[{"award-number":["XDA06010702"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,7]]},"DOI":"10.1145\/2818000.2818046","type":"proceedings-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T17:06:08Z","timestamp":1449853568000},"page":"381-390","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["MobiPluto"],"prefix":"10.1145","author":[{"given":"Bing","family":"Chang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China and University of Chinese Academy of Sciences, China"}]},{"given":"Zhan","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China"}]},{"given":"Bo","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology, The Pennsylvania State University, USA"}]},{"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Wayne State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/www.centos.org\/docs\/5\/html\/Cluster_Logical_Volume_Manager\/","author":"Administrator's Guide LVM","year":"2007","unstructured":"LVM Administrator's Guide . https:\/\/www.centos.org\/docs\/5\/html\/Cluster_Logical_Volume_Manager\/ , 2007 . LVM Administrator's Guide. https:\/\/www.centos.org\/docs\/5\/html\/Cluster_Logical_Volume_Manager\/, 2007."},{"key":"e_1_3_2_1_2_1","volume-title":"May","author":"Nexus S","year":"2012","unstructured":"\"partitioning\" your Nexus S using LVM. http:\/\/forum.xda-developers.com\/nexus-s\/general\/howto-partitioning-nexus-s-using-lvm-t1656794 , May 2012 . \"partitioning\" your Nexus S using LVM. http:\/\/forum.xda-developers.com\/nexus-s\/general\/howto-partitioning-nexus-s-using-lvm-t1656794, May 2012."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/www.grc.com\/misc\/truecrypt\/TrueCrypt%20User%20Guide.pdf","author":"User's Guide TrueCrypt","year":"2012","unstructured":"TrueCrypt User's Guide . https:\/\/www.grc.com\/misc\/truecrypt\/TrueCrypt%20User%20Guide.pdf , 2012 . TrueCrypt User's Guide. https:\/\/www.grc.com\/misc\/truecrypt\/TrueCrypt%20User%20Guide.pdf, 2012."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/technet.microsoft.com\/en-us\/library\/hh831713.aspx","author":"Overview BitLocker","year":"2013","unstructured":"BitLocker Overview . https:\/\/technet.microsoft.com\/en-us\/library\/hh831713.aspx , 2013 . BitLocker Overview. https:\/\/technet.microsoft.com\/en-us\/library\/hh831713.aspx, 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/forum.cyanogenmod.org\/topic\/4226-has-anyone-considered-lvm-on-android\/","author":"Android Consider LVM","year":"2013","unstructured":"Consider LVM on Android . http:\/\/forum.cyanogenmod.org\/topic\/4226-has-anyone-considered-lvm-on-android\/ , 2013 . Consider LVM on Android. http:\/\/forum.cyanogenmod.org\/topic\/4226-has-anyone-considered-lvm-on-android\/, 2013."},{"key":"e_1_3_2_1_6_1","volume-title":"version 5.21. Project website: http:\/\/sourceforge.net\/projects\/freeotfe.mirror\/","author":"Cs OTFE","year":"2014","unstructured":"Free OTFE - Free disk encryption software for P Cs and PDAs. version 5.21. Project website: http:\/\/sourceforge.net\/projects\/freeotfe.mirror\/ , 2014 . FreeOTFE - Free disk encryption software for PCs and PDAs. version 5.21. Project website: http:\/\/sourceforge.net\/projects\/freeotfe.mirror\/, 2014."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/source.android.com\/devices\/tech\/security\/encryption\/","author":"Android","year":"2015","unstructured":"Android encryption. https:\/\/source.android.com\/devices\/tech\/security\/encryption\/ , 2015 . Android encryption. https:\/\/source.android.com\/devices\/tech\/security\/encryption\/, 2015."},{"key":"e_1_3_2_1_8_1","unstructured":"AOSP\n  : Android open source project. http:\/\/source.android.com\/ 2015.  AOSP: Android open source project. http:\/\/source.android.com\/ 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"LVM","author":"Appendix","unstructured":"Appendix E. LVM Volume Group Metadata. https:\/\/access.redhat.com\/documentation\/en-US\/Red_Hat_Enterprise_Linux\/6\/html\/Logical_Volume_Manager_Administration\/lvm_metadata.html, 2015 . Appendix E. LVM Volume Group Metadata. https:\/\/access.redhat.com\/documentation\/en-US\/Red_Hat_Enterprise_Linux\/6\/html\/Logical_Volume_Manager_Administration\/lvm_metadata.html, 2015."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/ext4.wiki.kernel.org\/index.php\/Ext4_Disk_Layout","author":"Layout Disk","year":"2015","unstructured":"Ext4 Disk Layout . https:\/\/ext4.wiki.kernel.org\/index.php\/Ext4_Disk_Layout , 2015 . Ext4 Disk Layout. https:\/\/ext4.wiki.kernel.org\/index.php\/Ext4_Disk_Layout, 2015."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/technet.microsoft.com\/en-us\/library\/cc938438.aspx","author":"FAT","year":"2015","unstructured":"FAT file system. https:\/\/technet.microsoft.com\/en-us\/library\/cc938438.aspx , 2015 . FAT file system. https:\/\/technet.microsoft.com\/en-us\/library\/cc938438.aspx, 2015."},{"key":"e_1_3_2_1_12_1","volume-title":"Encrypt the contents of your Mac with FileVault. https:\/\/support.apple.com\/kb\/PH18637?locale=en_US&viewlocale=en_US","author":"Yosemite OS X","year":"2015","unstructured":"OS X Yosemite : Encrypt the contents of your Mac with FileVault. https:\/\/support.apple.com\/kb\/PH18637?locale=en_US&viewlocale=en_US , 2015 . OS X Yosemite: Encrypt the contents of your Mac with FileVault. https:\/\/support.apple.com\/kb\/PH18637?locale=en_US&viewlocale=en_US, 2015."},{"key":"e_1_3_2_1_13_1","volume-title":"http:\/\/www.crystalinks.com\/plutorome.html","author":"Underworld Pluto-King","year":"2015","unstructured":"Pluto-King of the Underworld . http:\/\/www.crystalinks.com\/plutorome.html , 2015 . Pluto-King of the Underworld. http:\/\/www.crystalinks.com\/plutorome.html, 2015."},{"key":"e_1_3_2_1_14_1","volume-title":"http:\/\/www.samsung.com\/global\/business\/semiconductor\/product\/flash-emmc\/overview","author":"Samsung","year":"2015","unstructured":"Samsung eMMC memory. http:\/\/www.samsung.com\/global\/business\/semiconductor\/product\/flash-emmc\/overview , 2015 . Samsung eMMC memory. http:\/\/www.samsung.com\/global\/business\/semiconductor\/product\/flash-emmc\/overview, 2015."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.56"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_6"},{"key":"e_1_3_2_1_17_1","volume-title":"PKCS 5: Password-based cryptography specification, version 2.0. RFC 2898 (informational)","author":"Kaliski B.","year":"2000","unstructured":"B. Kaliski . PKCS 5: Password-based cryptography specification, version 2.0. RFC 2898 (informational) , 2000 . B. Kaliski. PKCS 5: Password-based cryptography specification, version 2.0. RFC 2898 (informational), 2000."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660313"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.706165"},{"key":"e_1_3_2_1_20_1","volume-title":"http:\/\/www.coker.com.au\/bonnie++\/","author":"Coker R.","year":"2009","unstructured":"R. Coker . Bonnie++ file system benchmark suite. http:\/\/www.coker.com.au\/bonnie++\/ , 2009 . R. Coker. Bonnie++ file system benchmark suite. http:\/\/www.coker.com.au\/bonnie++\/, 2009."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/blog.kaspersky.com\/full-disk-encryption-android-5\/","author":"Donohue B.","year":"2014","unstructured":"B. Donohue . Android 5.0 data better protected with new crypto system. https:\/\/blog.kaspersky.com\/full-disk-encryption-android-5\/ , 2014 . B. Donohue. Android 5.0 data better protected with new crypto system. https:\/\/blog.kaspersky.com\/full-disk-encryption-android-5\/, 2014."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866925"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208461.2208463"},{"key":"e_1_3_2_1_24_1","volume-title":"Rubberhose Filesystem. Archive available at: http:\/\/web.archive.org\/web\/20120716034441\/http:\/\/marutukku.org\/","author":"Assange J.","year":"2001","unstructured":"J. Assange , R.P. Weinmann , and S. Dreyfus . Rubberhose Filesystem. Archive available at: http:\/\/web.archive.org\/web\/20120716034441\/http:\/\/marutukku.org\/ , 2001 . J. Assange, R.P. Weinmann, and S. Dreyfus. Rubberhose Filesystem. Archive available at: http:\/\/web.archive.org\/web\/20120716034441\/http:\/\/marutukku.org\/, 2001."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27552-4_89"},{"key":"e_1_3_2_1_26_1","volume-title":"http:\/\/blog.credit.com\/2013\/01\/the-10-dumbest-risks-people-take-on-their-smartphones-64384\/","author":"Levin A.","year":"2013","unstructured":"A. Levin . The 10 Dumbest Risks People Take With Their Smartphones . http:\/\/blog.credit.com\/2013\/01\/the-10-dumbest-risks-people-take-on-their-smartphones-64384\/ , 2013 . A. Levin. The 10 Dumbest Risks People Take With Their Smartphones. http:\/\/blog.credit.com\/2013\/01\/the-10-dumbest-risks-people-take-on-their-smartphones-64384\/, 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.111"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/647596.731709"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260829"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23078"},{"key":"e_1_3_2_1_31_1","volume-title":"Desirable features for plausibly deniable encryption. https:\/\/www.os3.nl\/_media\/2012-2013\/courses\/ssn\/desirable_features_for_plausibly_deniable_encryption.pdf","author":"Ragnarsson B.","year":"2012","unstructured":"B. Ragnarsson , G. Toth , H. Bagheri , and W. Minnaard . Desirable features for plausibly deniable encryption. https:\/\/www.os3.nl\/_media\/2012-2013\/courses\/ssn\/desirable_features_for_plausibly_deniable_encryption.pdf , 2012 . B. Ragnarsson, G. Toth, H. Bagheri, and W. Minnaard. Desirable features for plausibly deniable encryption. https:\/\/www.os3.nl\/_media\/2012-2013\/courses\/ssn\/desirable_features_for_plausibly_deniable_encryption.pdf, 2012."},{"key":"e_1_3_2_1_32_1","unstructured":"E. Silverstein. 2013 Was a Year to Remember for NAND eMMC Memory. http:\/\/www.mobilitytechzone.com\/topics\/4g-wirelessevolution\/articles\/2014\/02\/28\/371835-2013-a-year-remember-nand-emmc-memory.htm 2014.  E. Silverstein. 2013 Was a Year to Remember for NAND eMMC Memory. http:\/\/www.mobilitytechzone.com\/topics\/4g-wirelessevolution\/articles\/2014\/02\/28\/371835-2013-a-year-remember-nand-emmc-memory.htm 2014."},{"key":"e_1_3_2_1_33_1","volume-title":"20th Annual Network and Distributed System Security Symposium, NDSS 2013","author":"Skillen A.","year":"2013","unstructured":"A. Skillen and M. Mannan . On implementing deniable storage encryption for mobile devices . In 20th Annual Network and Distributed System Security Symposium, NDSS 2013 , San Diego, California, USA, February 24--27 , 2013 . A. Skillen and M. Mannan. On implementing deniable storage encryption for mobile devices. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24--27, 2013."},{"key":"e_1_3_2_1_34_1","volume-title":"Thin Provisioning Tools. https:\/\/github.com\/jthornber\/thin-provisioning-tools","author":"Thornber J.","year":"2015","unstructured":"J. Thornber . Thin Provisioning Tools. https:\/\/github.com\/jthornber\/thin-provisioning-tools , 2015 . J. Thornber. Thin Provisioning Tools. https:\/\/github.com\/jthornber\/thin-provisioning-tools, 2015."},{"key":"e_1_3_2_1_35_1","volume-title":"Free open source on-the-fly disk encryption software.version 7.1a. Project website: http:\/\/www.truecrypt.org\/","year":"2012","unstructured":"TrueCrypt. Free open source on-the-fly disk encryption software.version 7.1a. Project website: http:\/\/www.truecrypt.org\/ , 2012 . TrueCrypt. Free open source on-the-fly disk encryption software.version 7.1a. Project website: http:\/\/www.truecrypt.org\/, 2012."},{"key":"e_1_3_2_1_36_1","first-page":"555","volume-title":"Information Security","author":"Yu X.","year":"2014","unstructured":"X. Yu , B. Chen , Z. Wang , B. Chang , W. T. Zhu , and J. Jing . MobiHydra: Pragmatic and multi-level plausibly deniable encryption storage for mobile devices . In Information Security , pages 555 -- 567 . Springer , 2014 . X. Yu, B. Chen, Z. Wang, B. Chang, W. T. Zhu, and J. Jing. MobiHydra: Pragmatic and multi-level plausibly deniable encryption storage for mobile devices. In Information Security, pages 555--567. Springer, 2014."}],"event":{"name":"ACSAC 2015: 2015 Annual Computer Security Applications Conference","location":"Los Angeles CA USA","acronym":"ACSAC 2015","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 31st Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818046","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:28Z","timestamp":1750225708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818046"}},"subtitle":["File System Friendly Deniable Storage for Mobile Devices"],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":36,"alternative-id":["10.1145\/2818000.2818046","10.1145\/2818000"],"URL":"https:\/\/doi.org\/10.1145\/2818000.2818046","relation":{},"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"2015-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}