2009
DOI: 10.1007/978-3-642-00587-9_12
|View full text |Cite
|
Sign up to set email alerts
|

Attacking the BitLocker Boot Process

Abstract: We discuss attack scenarios against the TPM-based boot process of BitLocker. BitLocker is a disk volume encryption feature included in some recent versions of Microsoft Windows. BitLocker is capable of using the TPM to manage all or a portion of its secret encryption keys. Specifically it uses the sealing feature to ensure keys are released only if the platform is in a predefined, trusted state. We present six ways in which an attacker may gain access to secret key material by manipulating the boot process in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…It is a block-based encryption system that works below the file system to provide transparent confidentiality to data stored [15]. Based on Türpe et al [16], BitLocker is vulnerable to different attacks that target how this encryption system uses the trusted platform module sealing mechanism. Apple's iOS prefer to use file-level encryption to secure its devices through an encryption hardware built into the device Direct Memory Access path between main memory and the flash memory.…”
Section: Confidential Storagementioning
confidence: 99%
See 1 more Smart Citation
“…It is a block-based encryption system that works below the file system to provide transparent confidentiality to data stored [15]. Based on Türpe et al [16], BitLocker is vulnerable to different attacks that target how this encryption system uses the trusted platform module sealing mechanism. Apple's iOS prefer to use file-level encryption to secure its devices through an encryption hardware built into the device Direct Memory Access path between main memory and the flash memory.…”
Section: Confidential Storagementioning
confidence: 99%
“…Based on that, an Android file stored in device will be fetched by XTS-AES system and then successfully encrypted. Different data sizes (1,4,8,16 MB) need to be tested, and performance in each case will be measured. To trace and diagnose the problems occurring in the system during the experiments and file handling crashes, a debugging environment needs to be set.…”
Section: Stages Of Developmentmentioning
confidence: 99%
“…In the digital domain, several security products, such as TrueCrypt 1 and BitLocker 2 provide encryption for the whole hard drive. These solutions assume the adversary does not have physical control of the laptop, because if the adversary has physical possession of the laptop, she can always successfully execute a number of attacks [14,15,16]. These approaches also seem to ignore the human element, or more precisely, induce performance overhead and decrease the usability of the laptop.…”
Section: Literature Overviewmentioning
confidence: 99%
“…The encryption keys can be derived from hibernation files or memory dump files. For example, while BitLocker may indeed protect against opportunistic stealing of a computer that is turned off at the time, there are several plausible scenarios for targeted attacks [65] [66]. There are many ways available to acquire the original encryption keys.…”
Section: (Ijacsa) International Journal Of Advanced Computer Science Andmentioning
confidence: 99%