Considerations for applying disk encryptors to environments subject to hostile overrun | IEEE Conference Publication | IEEE Xplore