The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 10th European Workshop on Systems Security 2017
DOI: 10.1145/3065913.3065914
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Suspended Devices from Memory Attacks

Abstract: Today's computing devices keep considerable amounts of sensitive data unencrypted in RAM. When stolen, lost or simply unattended, attackers are capable of accessing the data in RAM with ease. Valuable and possibly classified data falling into the wrongs hands can lead to severe consequences, for instance when disclosed or reused to log in to accounts or to make transactions. We present a lightweight and hardware-independent mechanism to protect confidential data on suspended Linux devices against physical atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Prior works have illustrated that trusted components can suffer power failures or crash fail, which can wipe out their states [38]. Further, these trusted components can face state rollback attacks [8,43], and the accompanying persistent memory can suffer data loss through malicious attacks [31,55]. If these attacks take place, byzantine replicas can manipulate the ordering of client requests, thereby violating application safety.…”
Section: Observationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Prior works have illustrated that trusted components can suffer power failures or crash fail, which can wipe out their states [38]. Further, these trusted components can face state rollback attacks [8,43], and the accompanying persistent memory can suffer data loss through malicious attacks [31,55]. If these attacks take place, byzantine replicas can manipulate the ordering of client requests, thereby violating application safety.…”
Section: Observationsmentioning
confidence: 99%
“…Existing trust-bft protocols expect Stateful trusted computations as they require their trusted components to be backed by persistent memory. However, recent works have illustrated that these trusted components and their accompanying memory hardware can face attacks such as power failure or rollbacks [8,31,43,55]. As a result, existing trust-bft protocols are stateless, which endangers safety.…”
Section: Trusted Bft Consensusmentioning
confidence: 99%
See 1 more Smart Citation
“…However, CryptKeeper is fragile versus Cold Boot attacks because it stores the encryption key in RAM. A related idea is in Huber et al [26]: the authors suggest to perform encryption of user space processes memory at suspend time, using the same key used for Full Disk Encryption (FDE). Yet another variant of this idea is presented in [25], where the system memory of portable devices, like notebooks and smartphones, is encrypted by means of the "freezer" infrastructure of the Linux kernel.…”
Section: Related Workmentioning
confidence: 99%
“…Other approaches encrypt the RAM of devices [30], [31] or groups of processes during their suspension [32] (suspend to RAM). While those concepts protect suspended devices and processes, they cannot protect secrets in RAM owned by running processes.…”
Section: Related Workmentioning
confidence: 99%