Skip to main content
Top
Published in: Cluster Computing 3/2017

11-01-2017

Cryptographic key protection against FROST for mobile devices

Authors: Xiaosong Zhang, Yu-an Tan, Yuan Xue, Quanxin Zhang, Yuanzhang Li, Can Zhang, Jun Zheng

Published in: Cluster Computing | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the flourish of applications based on the internet of things and cloud computing, privacy issues have been attracting a lot of attentions. Although the increasing use of full disk encryption (FDE) significantly hamper privacy leakage and digital forensics, cold boot attacks have thwarted FDE since forensic recovery of scrambled telephones (FROST), a forensic tool, is proposed. The cryptographic keys which are stored in the mobile devices are inclined to be obtained by FROST. Recent research results have shown CPU-bound encryption methods to resist FROST. However, these methods performs AES encryption solely on CPU registers, whose advantage comes at the cost of encryption speed. This paper, therefore, presents a cryptographic key protection scheme for android devices which prevents FROST from acquiring the key of AES by changing storage location of the key in memory. The storage location of the key is switched to the fixed position where command line parameters will be stored when android boots. Therefore, the key will be covered by command line parameters while the system reboots, which negates FROST from obtaining the key. Compared with the popular CPU-bound encryption methods, our method has less impact on encryption efficiency and employs no additional storage resources.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gupta, B.B., Agrawal, D.P., Yamaguchi, S.: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global, Hershey (2016)CrossRef Gupta, B.B., Agrawal, D.P., Yamaguchi, S.: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global, Hershey (2016)CrossRef
2.
go back to reference Xu, M., Song, C., Ji, Y., Shih, M.-W., Lu, K., Zheng, C., Duan, R., Jang, Y., Lee, B., Qian, C., et al.: Toward engineering a secure android ecosystem: a survey of existing techniques. ACM Comput. Surv. (CSUR) 49(2), 38 (2016)CrossRef Xu, M., Song, C., Ji, Y., Shih, M.-W., Lu, K., Zheng, C., Duan, R., Jang, Y., Lee, B., Qian, C., et al.: Toward engineering a secure android ecosystem: a survey of existing techniques. ACM Comput. Surv. (CSUR) 49(2), 38 (2016)CrossRef
3.
go back to reference Sufatrio, Darell, J.J., Chua, T.-W., Thing, V.L.L.: Securing android: a survey, taxonomy, and challenges. ACM Comput. Surv. 47(4), 1–45 (2015)CrossRef Sufatrio, Darell, J.J., Chua, T.-W., Thing, V.L.L.: Securing android: a survey, taxonomy, and challenges. ACM Comput. Surv. 47(4), 1–45 (2015)CrossRef
4.
go back to reference Rastogi, S., Bhushan, K., Gupta, B.B.: Android applications repackaging detection techniques for smartphone devices. Proced. Comput. Sci. 78, 26–32 (2016)CrossRef Rastogi, S., Bhushan, K., Gupta, B.B.: Android applications repackaging detection techniques for smartphone devices. Proced. Comput. Sci. 78, 26–32 (2016)CrossRef
5.
go back to reference Sharma, K., Gupta, B.B.: Multi-layer defense against malware attacks on smartphone wi-fi access channel. Proced. Comput. Sci. 78, 19–25 (2016) Sharma, K., Gupta, B.B.: Multi-layer defense against malware attacks on smartphone wi-fi access channel. Proced. Comput. Sci. 78, 19–25 (2016)
6.
go back to reference Zhu, R., Tan, Y., Zhang, Q., Wu, F., Zheng, J., Xue, Y.: Determining image base of firmware files for arm devices. IEICE Trans. Inf. Syst. 99(2), 351–359 (2016)CrossRef Zhu, R., Tan, Y., Zhang, Q., Wu, F., Zheng, J., Xue, Y.: Determining image base of firmware files for arm devices. IEICE Trans. Inf. Syst. 99(2), 351–359 (2016)CrossRef
7.
go back to reference Zhu, R., Tan, Y., Zhang, Q., Li, Y., Zheng, Jun: Determining image base of firmware for arm devices by matching literal pools. Digit. Invest. 16, 19–28 (2016)CrossRef Zhu, R., Tan, Y., Zhang, Q., Li, Y., Zheng, Jun: Determining image base of firmware for arm devices by matching literal pools. Digit. Invest. 16, 19–28 (2016)CrossRef
8.
go back to reference Müller, T., Spreitzenbarth, M.: Frost. In: International Conference on Applied Cryptography and Network Security, pp. 373–388. Springer, New York (2013) Müller, T., Spreitzenbarth, M.: Frost. In: International Conference on Applied Cryptography and Network Security, pp. 373–388. Springer, New York (2013)
9.
go back to reference Carbone, R., Bean, C., Salois, M.: An in-depth analysis of the cold boot attack. DRDC Valcartier, Defence Research and Development, Canada, Tech. Rep. (2011) Carbone, R., Bean, C., Salois, M.: An in-depth analysis of the cold boot attack. DRDC Valcartier, Defence Research and Development, Canada, Tech. Rep. (2011)
10.
go back to reference Gruhn, M., Müller, T.: On the practicability of cold boot attacks. In: Eighth International Conference on Availability, Reliability and Security (ARES), 2013, pp. 390–397. IEEE (2013) Gruhn, M., Müller, T.: On the practicability of cold boot attacks. In: Eighth International Conference on Availability, Reliability and Security (ARES), 2013, pp. 390–397. IEEE (2013)
12.
go back to reference Müller, T., Dewald, A., Freiling, F.C.: Aesse: a cold-boot resistant implementation of aes. In: Proceedings of the Third European Workshop on System Security, pp. 42–47. ACM (2010) Müller, T., Dewald, A., Freiling, F.C.: Aesse: a cold-boot resistant implementation of aes. In: Proceedings of the Third European Workshop on System Security, pp. 42–47. ACM (2010)
13.
go back to reference Simmons, P.: Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 73–82. ACM (2011) Simmons, P.: Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 73–82. ACM (2011)
14.
go back to reference Müller, T., Freiling, F.C., Dewald, A.: Tresor runs encryption securely outside ram. In: USENIX Security Symposium, vol. 17 (2011) Müller, T., Freiling, F.C., Dewald, A.: Tresor runs encryption securely outside ram. In: USENIX Security Symposium, vol. 17 (2011)
15.
go back to reference Müller, T., Taubmann, B., Freiling, F.C.: Trevisor. In: International Conference on Applied Cryptography and Network Security, pp. 66–83. Springer (2012) Müller, T., Taubmann, B., Freiling, F.C.: Trevisor. In: International Conference on Applied Cryptography and Network Security, pp. 66–83. Springer (2012)
16.
go back to reference Götzfried, J., Müller, T.: Armored: Cpu-bound encryption for android-driven arm devices. In: Eighth International Conference on Availability, Reliability and Security (ARES) 2013, pp. 161–168. IEEE (2013) Götzfried, J., Müller, T.: Armored: Cpu-bound encryption for android-driven arm devices. In: Eighth International Conference on Availability, Reliability and Security (ARES) 2013, pp. 161–168. IEEE (2013)
17.
go back to reference Nilsson, A., Andersson, M., Axelsson, S.: Key-hiding on the arm platform. Digit. Invest. 11, S63–S67 (2014)CrossRef Nilsson, A., Andersson, M., Axelsson, S.: Key-hiding on the arm platform. Digit. Invest. 11, S63–S67 (2014)CrossRef
18.
go back to reference Henson, M., Taylor, S.: Memory encryption: a survey of existing techniques. ACM Comput. Surv. (CSUR) 46(4), 53 (2014)CrossRefMATH Henson, M., Taylor, S.: Memory encryption: a survey of existing techniques. ACM Comput. Surv. (CSUR) 46(4), 53 (2014)CrossRefMATH
19.
go back to reference McGregor, P., Hollebeek, T., Volynkin, A., White, M.: Braving the cold: new methods for preventing cold boot attacks on encryption keys. In: Black Hat Security Conference, Las Vegas (2008) McGregor, P., Hollebeek, T., Volynkin, A., White, M.: Braving the cold: new methods for preventing cold boot attacks on encryption keys. In: Black Hat Security Conference, Las Vegas (2008)
21.
go back to reference Gutmann, P.: Data remanence in semiconductor devices. In: Proceedings of the 10th conference on USENIX Security Symposium, vol. 10. USENIX Association (2001) Gutmann, P.: Data remanence in semiconductor devices. In: Proceedings of the 10th conference on USENIX Security Symposium, vol. 10. USENIX Association (2001)
22.
go back to reference Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009)CrossRef Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009)CrossRef
Metadata
Title
Cryptographic key protection against FROST for mobile devices
Authors
Xiaosong Zhang
Yu-an Tan
Yuan Xue
Quanxin Zhang
Yuanzhang Li
Can Zhang
Jun Zheng
Publication date
11-01-2017
Publisher
Springer US
Published in
Cluster Computing / Issue 3/2017
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-016-0721-3

Other articles of this Issue 3/2017

Cluster Computing 3/2017 Go to the issue

Premium Partner