Android full-disk encryption: a security assessment

نویسندگان

  • Oliver Kunz
  • Keith Martin
چکیده

Mobile phones evolved from basic telecommunication devices to smartphones which are, in essence, pocket computers. With this technological evolution their usage also changed. Nowadays users do not just keep contact details and text messages but also e-mails, chat communications, documents, browsing history and other data stored on their mobiles. Different actors are interested in this data: criminals, competitors, as well as law enforcers. In 2014, Google announced that it would enable Android’s full-disk encryption by default. Encryption is a dual-used good, since it protects data from invasive third parties but at the same time there are situations where law-supported third parties need access to that data. Law enforcers face increasing difficulties in collecting evidence for the prosecution of criminals. This project aims to understand how Android’s full-disk encryption feature is implemented in the broader context of the framework and to assess the security of this feature. We analyse the source code which provides the encryption functionality, manages the encryption keys and triggers decryption on device boot. We researched known vulnerabilities to cryptographic primitives employed as well as to similar full-disk encryption implementations in Linux and Android. According to Google, Android 5.0 was improved to prevent Offline Exhaustive Password Search Attacks to recover the screen lock method which is also used to protect the master key for disk encryption. In our research we confirm this statement while presenting an alternative attack approach we call Semi-Offline Exhaustive Password Search Attack. In contrast to the Offline approach, the smartphone is used for a particular step in the attack, hence the name Semi-Offline. Our attack takes five times longer than the Offline attack but is more than ten times faster than an Online Exhaustive Password Search Attack. The threat model covered by Android, as we identified, only protects data at rest. This requires the smartphone to be shut down, a rather rare state for mobile phones. We therefore included in our assessment the attack scenario Device-ON. With transparent encryption, each disk read is decrypted and each write encrypted. An attacker who manages to bypass lock-screen authentication therefore has full access to the otherwise encrypted data. We assessed the misuse potential of Smart Lock, an authorized lock-screen bypass feature introduced in Android 5.0, based on configurable trust agents. A trust agent can for example be a location, device, face or body movement. We were able to demonstrate in three of the four categories how an adversary can misuse the feature and described a potential scenario for the last. For various attacks and vulnerabilities, we proposed new countermeasures or improvements to existing ones.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Android 7 File Based Encryption and the Attacks Against It

Android users have been provided with some level of disk encryption since Android 3.0 “Honeycomb”. This is marketed as ‘Full Disk’ encryption (FDE). FDE allows users to encrypt their /data partition. The major problem with FDE is that after rebooting, multiple critical functions of the device are unusable without user interaction. File Based encryption (FBE) was introduced to overcome this issu...

متن کامل

Analysing Android's Full Disk Encryption Feature

Since Android 4.0, which was released in October 2011, users of Android smartphones are provided with a built-in encryption feature to protect their home partitions. In the work at hand, we give a structured analysis of this software-based encryption solution. For example, software-based encryption always requires at least a small part of the disk to remain unencrypted; in Android this is the e...

متن کامل

Security Analysis of Android Factory Resets

With hundreds of millions of devices expected to be traded by 20181, flaws in smartphone sanitisation functions could be a serious problem. Trade press reports2 have already raised doubts about the effectiveness of Android “Factory Reset”, but this paper presents the first comprehensive study of the issue. We study the implementation of Factory Reset on 21 Android smartphones from 5 vendors run...

متن کامل

got HW crypto? On the (in)security of a Self-Encrypting Drive series

Self encrypting devices (SEDs) doing full disk encryption are getting more and more widespread. Hardware implemented AES encryption provides fast and transparent encryption of all user data on the storage medium, at all times. In this paper we will look into some models in a self encryption external hard drive series; the Western Digital My Passport series. We will describe the security model o...

متن کامل

An Adaptive Technique using Advanced Encryption Standard to Implement Hard Disk Security

The main objective of the paper is to study and develop an efficient method for Hard Disk Drive(HDD) Security using Full Disk Encryption (FDE) with Advanced Encryption Standards(AES) for data security specifically for Personal Computers(PCS) and Laptops. The focus of this work is to authenticate and protect the content of HDD from illegal use. The paper proposes an adaptive methods for protecti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016