Presented By Peter Matthews

Slides:



Advertisements
Similar presentations
Key Management And Key Distribution The essential problems addressed by all cryptosystems is how to safely exchange keys and how to easily manage the.
Advertisements

Computer Organization and Architecture
White-Box Cryptography
This presentation will take a look at to prevent your information from being discovered by and investigator.
Block Ciphers and the Data Encryption Standard
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Section 3.2: Operating Systems Security
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Data Encryption Overview South Seas Corporation Jared Owensby.
Iron Key and Portable Drive Security Zakary Littlefield.
Lest We Remember Cold-Boot Attacks Against Disk Encryption J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A.
IT Systems Memory EN230-1 Justin Champion C208 –
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Data Storage Technology
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
0x1A Great Papers in Computer Security
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Lecture 2: Message Authentication Anish Arora CSE5473 Introduction to Network Security.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Memory Hierarchy.
Elements of a Computer System Dr Kathryn Merrick Thursday 4 th June, 2009.
Mac OS Lion Memory Forensics Using IEEE 1394 to Bypass FileVault 2 Full Volume Encryption. Todd Garrison September 18, 2011.
Computers in the real world Objectives Understand what is meant by memory Difference between RAM and ROM Look at how memory affects the performance of.
CS 1308 Computer Literacy and the Internet. Introduction  Von Neumann computer  “Naked machine”  Hardware without any helpful user-oriented features.
Protecting Data on Smartphones and Tablets from Memory Attacks
What is a BIOS? * basic input/output system (BIOS), also known as the System BIOS * The BIOS software is built into the PC on a non-volatile ROM and is.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Chidambaranathan C.M SRM University,Haryana. Memory:- As the word implies “memory” means the place where we have to store any thing, this is very essential.
Agenda Introduction. Design. Trust and Threat Model. Key-Encrypting Keys. Token Vulnerabilities. Token-Laptop Interaction. Assigning File keys & Handling.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 18 Windows – NT File System (NTFS)
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Jeffrey Ellak CS 147. Topics What is memory hierarchy? What are the different types of memory? What is in charge of accessing memory?
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Attacking an obfuscated cipher by injecting faults Matthias Jacob Dan Boneh Edward.
1 Device Controller I/O units typically consist of A mechanical component: the device itself An electronic component: the device controller or adapter.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
Information Systems Design and Development Security Precautions Computing Science.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Chapter 2 content Basic organization of computer What is motherboard
Presented by Kartik Patel
Trusted Computing and the Trusted Platform Module
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
Outline Desirable characteristics of ciphers Uses of cryptography
Lest We Remember: Cold-Boot Attacks on Encryption Keys
Outline What does the OS protect? Authentication for operating systems
Introduction to Computers
Outline Desirable characteristics of ciphers Uses of cryptography
Booting Up 15-Nov-18 boot.ppt.
Hiding Information, Encryption, and Bypasses
TPM, UEFI, Trusted Boot, Secure Boot
Motherboard BIOS and Troubleshooting
The bios.
“Encryption threatens to lead all of us to a very dark place.”
Presentation transcript:

Presented By Peter Matthews Lest We Remember: Cold Boot Attacks on Encryption Keys By J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten Appears in the Proceedings of the 17th USENIX Security Symposium (Sec ‘08), San Jose, CA, July 2008 Presented By Peter Matthews

Outline Disk Encryption The Attack in a Nutshell Memory Remanence Experimental Results Cold Boot Attack Physical Software Results Countermeasures

Introduction to Disk Encryption Disk encryption is one solution to the growing need to protect access to sensitive data Allows transparent read/write access to the hard drive while protecting the information stored on it via high- strength encryption Typically requires initial authentication before granting access Password Biometrics such as fingerprint scanners USB dongle Example: Using disk encryption with a laptop HD to prevent data theft if the machine is lost or stolen

Disk Encryption - Writing

Disk Encryption - Reading

Popular Disk Encryption Software BitLocker (Vista) TrueCrypt (Win/Mac/Linux) FileVault (OSX)

Disk Encryption 20% of companies reported encrypting laptops in 2007 Source: Ponemon Institute: 2008 Annual Study: U.S. Enterprise Encryption Trends Software attempts to minimize impact on user experience To ensure high performance, the keys are stored persistently in memory

Attack in a Nutshell Paper presents attacks that can defeat these disk encryption packages if an attacker gains physical access to the computer Take only a few minutes Require no expensive/exotic equipment Most need computer to be on or in sleep mode Some even work if computer is off Rather than trying to break encryption, attack uses a little known property of RAM and looks for the stored key in memory after a forced reboot Bottom line: If computer is stolen or is left unattended for short time, attacker can find the disk encryption keys and access the protected data

Memory Remanence What happens to data stored in volatile memory (RAM) when the computer’s power is cut? Widespread belief: Data is erased In fact, data fades away gradually over a period of seconds to minutes The following video demonstrates this:

Video Source: http://citp. princeton. edu. nyud

Memory Remanence A DRAM cell is essentially a capacitor Stores one bit by charging or not charging one of the conductors Other conductor hard-wired to power or ground depending on address Over time the charge will leak out of the capacitor Cell returns to “ground state” – 1 or 0 depending on whether hard wired to power or ground To prevent this, cell must be refreshed (re-charged) on a set schedule

Memory Remanence Experiments show that the pattern to which the memory cells fade and the order in which they do so are highly predictable Cause: manufacturing variations They also show that temperature has a very significant effect on the rate at which cells lose their state

Effect of Cooling on Error Rates Machine Seconds w/out power Error % at operating temp Error % at -50º C A 60 41 No errors 300 50 0.000095 B 360 C 600 0.000036 120 0.00105 42 0.00144 D 40 0.025 80 0.18 Effect of Cooling on Error Rates

Even Colder… Liquid nitrogen boils at - 196 °C Stored data in these memory modules, cooled them, removed them from the computer, and placed them in a container of liquid nitrogen for an hour After returning them to the computer, found practically no information had been lost

Imaging Residual Memory Warm-boot, configure BIOS to start tool No memory decay, but gives software chance to wipe sensitive data Disconnect and reconnect power (cold-boot) Little to no memory decay Transferring DRAM modules Cool DRAM modules with “canned air”, physically remove from machine, and place into other machine May be able to avoid BIOS overwriting portion of memory if placed in secondary slot

Imaging Residual Memory When the system boots, memory controller begins refreshing the memory cells and decay halts Booting necessarily overwrites some memory Minimize: Use tiny special-purpose program to dump contents to external medium or network address Start tool via: Network boot Intel Preboot Execution Environment (PXE) Intel-Mac Extensible Firmware Interface (EFI) USB flash drives / external hard drives iPod Authors wrote software for and successfully used all of these

Key Reconstruction Even a small amount of error complicates the process of extracting correct cryptographic keys Naïve approach: Brute-force search over keys with a low Hamming distance from the one in memory -- The number of positions for which the corresponding bits are different This quickly becomes computationally infeasible Most encryption programs speed up computation by storing pre-computed data For block ciphers, this is a “key schedule” with subkeys for each round of the algorithm

Key Reconstruction This pre-computed data contains much more structure than the key itself Can use this structure to efficiently reconstruct original key in presence of errors Structure allows self-contained key validity proving No need to test decryption of ciphertext May be thought of as an error correcting code for the key

Example – Reconstructing DES Keys DES – 56 bit key DES key schedule algorithm produces 16 subkeys Each a permutation of a 48-bit subset of bits from the original 56 bit key Every bit from the original key is repeated in about 14 of the 16 subkeys Use the values of these 14 copies of a bit to make a decision about the most likely value of that bit Even with a 25% error, the probability that the key can be decoded without brute force search is more than 98% Trivially extends to 3DES

Finding Keys in Memory Test every sequence of bytes to see if it decrypts known ciphertext Too expensive, only works if memory portion is perfectly accurate Look for the key schedule rather than the key itself Valid key schedule has certain combinatorial properties Iterate through each appropriately sized block of memory, treating as key schedule For each key schedule word calculate its Hamming distance from the key schedule word that should be generated from the surrounding words

Results Defeated Microsoft Bitlocker (Windows) Apple FileVault (OSX) TrueCrypt (Win/Mac/Linux) dm-crypt (built-in Linux disk encryption system) Loop-AES (Linux)

Countermeasures Scrubbing memory Proactively clear memory when keys no longer in use Force clear memory at boot time via BIOS Restrict booting from network / removable media Still possible to replace /add hard drives Suspending a system safely Require password to reawaken machine, encrypt memory with key derived from password Avoid pre-computation High performance overhead

Countermeasures Continued… Store pre-computed key components in a difficult to reconstruct format Hashing can make it more sensitive to bit errors Physical defenses Lock/Epoxy DRAM modules in place Overwrite memory if case opened or low temperature detected Hardware defenses Provide safe place to store keys Move encryption to disk controller

Conclusion – Paper Strengths Uses a little known property to craft a novel and unforeseen attack Demonstrated to work against a number of products in wide use Extends to further uses: were able to find the OSX user login password stored in memory Well written and presented Excellent companion website Documented source code, Pictures, Video, etc.

Conclusion – Paper Weaknesses Certain probabilistic results seem to imply that the authors already know which blocks’ ground states are 0 / 1 Is this realistic in an attack scenario?

Future Work What else is stored in “untouchable” memory? Authors found OSX user login password stored multiple place in local memory Possible to use memory addresses that every BIOS has to overwrite due to X86 legacy? Production of effective hardware defenses A precise quantification of remanence effects on RAM of various types and from various makers

Questions?