Data can leak from partially encrypted disks

Some popular apps leak encrypted data to unencrypted areas, researchers say

If you're using encryption software to keep part of your computer's hard drive private, you may have a problem, according to researchers at the University of Washington and BT Group PLC.

They've discovered that popular programs such as Microsoft Corp.'s Word and Google Desktop store data on unencrypted sections of a computer's hard drive, even when the programs are working with encrypted files.

"Information is spilling out from the encrypted region into the unencrypted region," said Tadayoshi Kohno, an assistant professor at the Seattle-based university and a co-author the study.

Kohno said there are probably many other applications and operating system components that leak information in a similar way. "I suspect that this is a potentially huge issue. We've basically cracked the surface," he said.

The researchers say that people who are using full-disk encryption, where every piece of data on their hard drives is encrypted, do not have to worry. However, the issue pops up when users create an encrypted partition or virtual disk on their hard drives, leaving part of the drives unencrypted, or when they store data on encrypted USB devices, Kohno said.

Nobody really knows how much data can be recovered from a partially encrypted disk, but the researchers say that they were able to recover copies of most of the Word documents created for their experiment from the software's autorecovery folder, even though the documents themselves were being saved to an encrypted part of the disk.

"We just don't know how much data is leaking out, but it's enough to be worried about," Kohno said.

With Google Desktop, the researchers were able to read snapshots of encrypted files when the program's Enhanced Search option was enabled.

The issue is not a bug in Word or Google Desktop, Kohno said. Rather, it's "a problem with the way these applications interact with these encrypted virtual disks," he said.

Kohno and his team, which includes noted cryptographer Bruce Schneier, chief security technology officer at BT, made their discovery while looking at so-called deniable file systems. These are encrypted file systems that require two passwords before they reveal their full contents. They give the user a way to reveal a first encryption password without necessarily divulging the full contents of the hard drive because a second hidden section is protected by the second password.

Looking at the TrueCrypt 5.1a deniable file system, they found that this same kind of data leakage occurred, exposing information that should have been protected by the system's second password. The researchers say that the most recent TrueCrypt 6.0 software does fix some of these problems, but that their work shows just how hard it is to protect a partially encrypted hard drive.

Their paper is set to be presented at the Usenix HotSec Workshop on July 29 in San Jose.

How AI is changing office suites
  
Shop Tech Products at Amazon