RAM is Key: Extracting Disk Encryption Keys From Volatile Memory

نویسندگان

  • Brian Kaplan
  • Matthew Geiger
چکیده

The increasing mobility of computing devices combined with frequent stories of privacy breaches and identity theft has thrust data encryption into the public eye. This heightened awareness of, and demand for, encryption has resulted in the development of a number of strong encryption solutions that emphasize usability. While encryption can help mitigate the threat of unintentional data exposure, it is equally capable of hiding evidence of criminal malfeasance. The increasing accessibility and usability of strong encryption solutions present new challenges for digital forensic investigators, whose traditional response methodologies leave them largely unprepared to deal with pervasive strong encryption. In this paper we address the shortcomings of the traditional forensic response methodology with respect to encryption. We develop and discuss a variety of practical techniques for dealing with the use of encryption to conceal evidence. Our research highlights the virtues of volatile memory analysis by demonstrating how key material and passphrases can be extracted from memory to facilitate the analysis of encrypted media in a forensically sound manner. We also present a proof of concept tool capable of automatically extracting key material from a volatile memory dump and using it to decrypt an encrypted disk image.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TRESOR Runs Encryption Securely Outside RAM

Current disk encryption techniques store necessary keys in RAM and are therefore susceptible to attacks that target volatile memory, such as Firewire and cold boot attacks. We present TRESOR, a Linux kernel patch that implements the AES encryption algorithm and its key management solely on the microprocessor. Instead of using RAM, TRESOR ensures that all encryption states as well as the secret ...

متن کامل

Copker: Computing with Private Keys without RAM

Cryptographic systems are essential for computer and communication security, for instance, RSA is used in PGP Email clients and AES is employed in full disk encryption. In practice, the cryptographic keys are loaded and stored in RAM as plain-text, and therefore vulnerable to physical memory attacks (e.g., cold-boot attacks). To tackle this problem, we propose Copker, which implements asymmetri...

متن کامل

Volatools: Integrating Volatile Memory Forensics into the Digital Investigation Process

In this work, we demonstrate the integral role of volatile memory analysis in the digital investigation process and how that analysis can be used to help address many of the challenges facing the digital forensics community. We also provide a look at some of the shortcomings of existing approaches to live response. Finally, we provide the technical details for extracting in-memory cryptographic...

متن کامل

Protecting Drive Encryption Systems Against Memory Attacks

Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memory and consequently decrypts the drive. We reviewed the currently existing mitigations and have found that they provide only partial protection, and none of them protect against the full range of memory attacks. We prop...

متن کامل

Analysing Android's Full Disk Encryption Feature

Since Android 4.0, which was released in October 2011, users of Android smartphones are provided with a built-in encryption feature to protect their home partitions. In the work at hand, we give a structured analysis of this software-based encryption solution. For example, software-based encryption always requires at least a small part of the disk to remain unencrypted; in Android this is the e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007