Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Encryption

Cold Reboot Attacks on Disk Encryption 398

jcrouthamel writes "Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them."
This discussion has been archived. No new comments can be posted.

Cold Reboot Attacks on Disk Encryption

Comments Filter:
  • Clear the DRAM? (Score:5, Interesting)

    by the4thdimension ( 1151939 ) on Thursday February 21, 2008 @11:44AM (#22503834) Homepage
    Could probably implement an algorithm at the operating system level that attempts to clear out DRAM except for what is actually needed for the operating system to power down/boot up. I am not sure of the exact logistics but it seems silly to just power down and leave the DRAM however it was, no matter if its instant cleared or take a few minutes.
    • Re:Clear the DRAM? (Score:5, Interesting)

      by KublaiKhan ( 522918 ) on Thursday February 21, 2008 @11:48AM (#22503910) Homepage Journal
      It is possible; I remember reading about a class of programs in the Jargon File that exploited certain machine code instructions to clear out the whole of the machine's memory, including itself.

      Can't remember the name of 'em, though.
      • Re:Clear the DRAM? (Score:5, Informative)

        by compro01 ( 777531 ) on Thursday February 21, 2008 @12:17PM (#22504344)
        death code [catb.org]
    • Re:Clear the DRAM? (Score:5, Insightful)

      by spun ( 1352 ) <loverevolutionar ... Nom minus author> on Thursday February 21, 2008 @11:49AM (#22503924) Journal
      So, that would stop me from physically turning off the computer and popping out the RAM, how exactly? What we need is a battery backed up hardware module that scrambles the RAM when the system loses power.
      • Use capacitors (Score:5, Insightful)

        by StCredZero ( 169093 ) on Thursday February 21, 2008 @11:59AM (#22504078)
        You could use a capacitor to power this mechanism instead of a battery. It wouldn't need to last very long -- just long enough to scramble the RAM on power-down. It would be more reliable than a battery.

        • by Amouth ( 879122 )
          unless the battery is made by Sony - cause last time i checked PCB was flamable - and am confident that you could set it to catch fire on power loss the memory would be useless..

          although that would be a brain dead setup to have... i could so see manufactures labeling it a "feature"
        • Re: (Score:3, Informative)

          by AchiIIe ( 974900 )
          I agree that the capacitor is the way to go. As a reminder, all harddrives are fitted with an emergency capacitor. If the hard drive looses power while the head is traveling there's a risk for a head crash. Thus, once power is lost, the capacitor will fire up the motor for one last push toward the parking space. if you have an external hard drive listen for the click that happens right after you pull the power.
          • Re: (Score:3, Informative)

            by tweak13 ( 1171627 )
            I heard that mechanism in hard drives explained to me as using the spindle motor as a generator to get the heads parked. Makes sense, there's a lot of inertia in the spinning platters that you may as well use.
          • Re:Use capacitors (Score:4, Informative)

            by greyhueofdoubt ( 1159527 ) on Thursday February 21, 2008 @02:51PM (#22506724) Homepage Journal
            erm... I have taken many hard drives apart, and I've never seen a cap in them (modern ones, at least) that would have enough power to turn the platters or energize the voice coil of the read head armature. It's been a while since I've seen anything other than surface-mount components.

            Usually what I find is a rare-earth magnet at one end of the voice coil's travel that locks the read heads away from the platter in the absence of voltage in the coil; this is aided as well by the torque exerted on the armature by the trace ribbons that feed voltage to the coil and read heads. Note that this magnet is separate and distinct from the two that control the lateral motion of the read/write armature.

            The 'clink' that you hear is the armature knocking up against the magnet. If you take the cover off, you can recreate the sound yourself, even without power.

            protip: HDD voice coils make great crude galvanometers.

            -b
        • by CarpetShark ( 865376 ) on Thursday February 21, 2008 @01:37PM (#22505624)
          Memory is reliably addressed -- writing to the address you wrote to earlier will change the same physical part of the ram. There are already existing tools that erase passphrases after a certain period without use. All you need to do is make those tools also scrub the addresses used to store it. A simple patch would cover that.

          What's more of a problem is: how to make this timeout+prompt for passphrase thing work with disk-level encyption regardless of whether you're a console or in a GUI, on an otherwise decent OS like unix? I wouldn't trust Windows to implement disk-level encyption safely anyway, so all bets are off there. But unix still has serious issues regarding the simple presentation of a dialog box to the user no matter what part of the system they're looking at, in a reliable and secure way.
      • Another option -- just make DRAM that drains all of its memory cells to ground when the power goes off. Every bit of DRAM is just a tiny capacitor, so this would erase the whole chip in an instant. If you could arrange for this to happen, then the DRAM would be be erased, unless you somehow supplied your own power to the DRAM chips.
        • Re:Secure DRAM (Score:5, Informative)

          by postbigbang ( 761081 ) on Thursday February 21, 2008 @12:10PM (#22504244)
          No, this is the problem; even with a ground, there's a charge held. DRAM isn't a charged-coupled device (CCD), instead, the charge drain doesn't work quickly, allowing DRAM to be read for a short while until things go to zero. The only protection you can give (see other posts) is to forcibly write a charge to all locations, or a sufficient number to scramble the eggs. All DRAM will eventually have cell decay to an unreadable point when the vcc is dropped. Several aforementioned schemes tell how to keep vcc on (capacitors, batteries, who knows-- maybe a DRAM fuel cell-- give your DRAM a drink). SRAM, photo-sensitive RAM, flash, and other ROM-ish RAM devices 'hold' a charge somewhat indefinitely depending on the technology in the device. DRAM eventually loses a detectable charge.
      • To heck with the power button. Just rip out the memory and run!
      • Re:Clear the DRAM? (Score:5, Insightful)

        by orclevegam ( 940336 ) on Thursday February 21, 2008 @12:15PM (#22504308) Journal
        As the4thdimension already pointed out, it's a common tenant in systems security that anyone with physical access and sufficient time can disable or otherwise bypass any security system. The fact is, if they're in a position to swipe the RAM out of your computer, they can just as easily take the HD to a secure location to try to brute force it, and/or attach some probes to the RAM and just read the bits straight off it, wouldn't even need to power the system down. Hardware security is just that, hardware, so there will never be an adequate software solution to a hardware security problem. Likewise, software security means nothing if the hardware is vulnerable. It's like building a safe with the most complex and impenetrable locking mechanism ever designed, and then using 1/4" aluminum for the body of the safe, sure no one's going to crack the locking mechanism, but all it takes is 5 minutes with a power drill to bypass it.

        That being said, some sort of physical security mechanism probably wouldn't be out of the question for scenarios that actually called for it. For instance, on systems that contain highly sensitive data such as nuclear launch codes or some such, I could envision a tripwire type system on the computer case that detonates shaped charges on the HD and RAM when the case is cracked. This does open up a possible DOS attack vector, but the alternative seems to justify it.
        • Hardware security is just that, hardware, so there will never be an adequate software solution to a hardware security problem. Likewise, software security means nothing if the hardware is vulnerable.

          I hear things like this a lot, and I disagree. The key words in the quote above are "adequate" and "nothing", which depend on a cost-benefit analysis. Just reducing risk can be more cost-effective than eliminating risk. Encryption is often an adequate software solution to a hardware security problem because

        • Re:Clear the DRAM? (Score:5, Insightful)

          by CountBrass ( 590228 ) on Thursday February 21, 2008 @01:09PM (#22505200)
          I think you've missed the point. Hard drive encryption *is* supposed to protect against someone having physical access to your machine.
          • Re:Clear the DRAM? (Score:5, Informative)

            by RAMMS+EIN ( 578166 ) on Thursday February 21, 2008 @01:21PM (#22505408) Homepage Journal
            Exactly! That is why this news item is actually big news. The idea of encrypting your disk is _exactly_ that someone without the key will not be able to access the data (within a reasonable amount of time - any encryption can be broken), even if they have physical access. And encrypting your disk does indeed prevent someone without the key from reading the data. What TFA tells us is that there is a way to get the key that we may not have considered, and I'm willing to bet many of us indeed hadn't. But now that we know of this attack vector, we can work against it.

            As long as we can keep the key hidden, the encryption will protect our data.
          • Re:Clear the DRAM? (Score:5, Interesting)

            by orclevegam ( 940336 ) on Thursday February 21, 2008 @01:27PM (#22505486) Journal
            Yes, but the point is, if the system is powered down when it's stolen, or the hard drive is removed from the system, the full disk encryption will still protect the data. This is only a valid attack vector in the highly unlikely occasion that you have access to the powered on system, and even then it's somewhat dubious as to whether you'll get the data you need off of it. As I said though, this is very interesting from an academic standpoint for the simple fact that it is something that hasn't really been thought of. That being the case though, I can already think of one way to prevent this. Simply store your decryption keys at memory offset 0000:7C00, which will ensure that the BIOS copies the boot loader over your keys the next time the system boots (on x86 systems at any rate).
        • by The Monster ( 227884 ) on Thursday February 21, 2008 @01:35PM (#22505598) Homepage

          it's a common tenant in systems security that anyone with physical access and sufficient time can disable or otherwise bypass any security system.
          Does it pay rent?

          I think the word you're looking for is "tenet [merriam-webster.com]".

        • Re: (Score:3, Informative)

          by Detritus ( 11846 )
          Some crypto hardware is designed with anti-tamper switches that will erase all keying data if the case is opened. There is often a front-panel switch (zeroize switch) to do the same thing upon operator command.
      • Re: (Score:3, Interesting)

        Excuse me? If you had access to the system, running and encrypted bits unlocked, why on earth would you turn it off? As I see it, this might be a problem if you get stormed by an adversary and pull the plug in an effort to secure your data.
        • Re: (Score:3, Informative)

          If you had access to the system, running and encrypted bits unlocked, why on earth would you turn it off?

          Because the OS has control of the system at that point. If the terminal is locked, even though the system is on, you won't be able to access anything until you get control of the hardware away from the OS. Also, when you start poking around on a system, you always have the potential of accidentally destroying evidence, and evidence is much weaker in court if there isn't an untampered version of the d

      • Re: (Score:3, Interesting)

        ATX power supplies are required to provide power for a certain amount of time after it signals the motherboard that it is shutting down. I forget how long that is, but it is probably long enough to wipe a few encryption keys if you know what part of memory to wipe. The attacker would then have to physically separate the power supply form the motherboard or remove the RAM while the system is running. To do that they would have to have the case open, so you could have sensors for tampering with the case th
    • by Hatta ( 162192 )
      Workaround: hit the main power off switch.
      • by Qzukk ( 229616 )
        Workaround: hit the main power off switch.

        Workaround: yank the DIMMs while the system's on.
        • Workaround: Superglue/epoxy the chips to the motherboard retention mechanism.
        • Work around: Detect if intrusion switch on chassis has be activated (by pulling the chassis open). If so, forcibly shutdown the system as soon as intrusion switch has been activated. Cover memory with some sort of physical device to prevent quick removal. Should give the RAM enough time to dissipate memory contents.
          • by tmalone ( 534172 ) on Thursday February 21, 2008 @12:13PM (#22504292)
            Or we could get rid of this easy to work with RAM that computers have now and go back to the olden days when you had to curse and scream and rip your hands to shreds on sharp metal corners to get at the RAM, which, once you got at was a pain in the ass to remove. Ah, the good old days.

      • It is easy to write scripts that do anti-forensic stuff on logon/logoff or startup/shutdown. Even pulling the plug [indocomp.com] is often not enough to freeze a system from doing stuff so that you can gather evidence.

    • by asc99c ( 938635 )
      I'd assume on reboot the plan is to not reboot the installed OS but probably to boot up a basic OS from a CD that gives free access to all the memory.
    • Re: (Score:3, Informative)

      by SharpFang ( 651121 )
      Still, power down without shutdown, then boot up operating system without such feature and you're gone.
      The only way I see it to be sure, DRAM upon losing power uses on-board capacitor to erase its own contents, the feature built into the RAM die. Even BIOS is not sufficient if you just pull the plug and move the RAM to a different PC.
  • Physical Access (Score:3, Insightful)

    by MosesJones ( 55544 ) on Thursday February 21, 2008 @11:49AM (#22503914) Homepage
    So lets thing what physical access means in these cases.

    1) They have your desktop computer
    2) It is on
    3) You've entered your crypto keys

    Is it me or is this just a little tenuous? In a data centre they'd have to drag the thing off the rack and on your personal machine they'd have to physically take it off you, because waiting for you to shutdown and then walk-away would be too long. So the solution is to shutdown the machine and THEN put your coat on and pack your bag.

    I can also get people's Crypto keys by threatening them with a knife or putting a CCTV camera over their workstation. There are "easier" ways to get the keys if you have physical access to the environment that are much simpler and reliable.

    • Re:Physical Access (Score:5, Informative)

      by nachoboy ( 107025 ) on Thursday February 21, 2008 @12:03PM (#22504138)
      Don't expect to have time to do anything if the feds bust down your door and want your boxes. Plus, now your machine doesn't even have to be turned off for someone to remove it to a forensic lab: introducing HotPlug [wiebetech.com].
    • Re:Physical Access (Score:5, Insightful)

      by mypalmike ( 454265 ) on Thursday February 21, 2008 @12:03PM (#22504142) Homepage
      on your personal machine they'd have to physically take it off you

      Like when your laptop is stolen while it's in sleep mode. This is rather a common situation.
    • Re: (Score:3, Interesting)

      by Qzukk ( 229616 )
      2) It is on
      3) You've entered your crypto keys


      These two are likely true for every kind of whole-drive encryption, unless the encrypted drive is unmounted every time you walk away. As for 1), it's true if you lock the console and walk away from the computer, which quite a lot of people do.

      Best workaround would be for A) operating systems to support fixing keys in a single spot in memory and B) drive encryption systems to automatically unmount and scramble the key (in the same place its always been, rather th
    • Re:Physical Access (Score:5, Informative)

      by TheRaven64 ( 641858 ) on Thursday February 21, 2008 @12:06PM (#22504168) Journal
      Think laptops. Laptop users with a half-decent OS don't turn their machines off, they just put them to sleep. When you turn the machine on, you enter your passphrase and it mounts the encrypted disk volume. When you close the lid, the OS locks the machine. You can't get in again without entering your pass phrase. If someone steals the machine, they can't log back in without knowing your password. If they shut the machine down and boot from a different disk then they can't access your data because it's encrypted and turning off the machine wiped the decryption key from RAM.

      Except, apparently, it didn't. With the new scenario, the thief takes the cover off the machine and then pulls the battery. They then cool the RAM chips and dump the contents. They can then scan through the dump looking for the decryption key. Once they've found it, they mount the encrypted volume from another OS and get at all of your confidential data.

      • The problem is much worse on laptops actually. Most laptops have some sort of CardBus slot nowadays. This is basically a PCI interface. The idea is to create a CardBus interface which allows you to dump the physical memory of the laptop using DMA. No need to freeze any memory, just insert your custom made card into the computer and wait for it to copy the memory contents to flash memory or something similar. There are a few question marks here though:
        • Is the Cardbus slot always enabled or must the OS en
        • by TheRaven64 ( 641858 ) on Thursday February 21, 2008 @01:19PM (#22505384) Journal
          True, although it is worth noting that this (and the equivalent FireWire attack) can be mitigated on laptops with newer AMD CPUs (and possibly the latest Intel ones if VT-d is now shipping). Newer AMD chips (or, more specifically, their on-board memory controllers) have a Device Exclusion Vector (DEV) which is a simple bitfield with an entry for each page in physical memory indicating whether a each device is able to DMA to or from that page. A well-behaved OS will set this up so that no device can access any memory unless the driver explicitly permits it. As long as the OS keeps the pages containing encryption keys in the 'never let any device access this' part of memory it will be safe.
    • by Yath ( 6378 )
      So the solution is to shutdown the machine and THEN put your coat on and pack your bag.

      You're going to turn it on later, right?

      Let's say you've taken your disk-encrypted laptop home and you're doing work on it. Thugs break in, throw flash grenades, yell, etc. You cut power to your laptop just before they grab it... they rip it open, freeze the contents, then pop out the drams. They put the drams in another machine and read your key, and thus have access to your hard drive. Damn. And you thought turning it o
  • That's the hard part, so any hack using this method almost has to be an inside job. How many hackers can actually walk into a location, take down the system, open it up and remove the memory DIMMS? In every data center I've worked at someone with that level of access is pretty well checked out, or if they are a vendor they are escorted and watched carefully. Pulling DIMMs out an puting them into liquid nitrogen is surely going to be noticed. It's not like you carry a Dewar in your pocket. Sure you can spoof
    • If you've put your laptop in standby, and the laptop is stolen, there's now a non-zero probability that the bad guys can access your encrypted data. The disk encryption people need to make sure that the standby routines erase any and all keys, and reprompt for access when the system comes out of standby.
  • by wiredog ( 43288 ) on Thursday February 21, 2008 @11:59AM (#22504084) Journal
    If the attacker has physical access to your system, it's not your system.
  • One potential workaround, which would probably require support from Intel/AMD: store a short encryption key in L1 cache. It doesn't need to be big, or use "proper" encryption - just enough to make the DRAM key useless unless you've got the cache memory.

    I would hope that the CPU could clear this cache as it powers down (even in a non-orderly manner).

    Then again, I realise that people who aren't experts (and I'm definitely not an expert) very rarely make suggestions which actually fix significant security hole
    • Re: (Score:3, Interesting)

      by mzs ( 595629 )
      VIA had a while back some registers that you cold tweak to lock L1 cache lines. I don't know if modern VIA chips still have this. In the X86 world I do not know of anything similar from Intel or AMD. You might have better luck using unused registers in the CPU (debugging registers) or external chips (chipset UART regs say) but then you really would not be able to use those anymore, but there may be enough legacy registers around not really used anymore to make it work with the penalty of it being very slow.
  • by Anonymous Coward on Thursday February 21, 2008 @12:04PM (#22504150)
    Heck, with physical access to a running machine, jack into the firewire or USB port and you have clear access to reading and writing all the memory you want.
    I wrote a small paper here http://www.friendsglobal.com/papers/FireWire%20Memory%20Dump%20of%20Windows%20XP.pdf [friendsglobal.com] for a forensics class on using firewire to access memory, subverting the operating system.

    All bets are off once physical access is gained. Best bet would be to store the keys, somehow, in the CPU's caches and never let it stay in main memory.
  • there's no such thing as absolute security

    all security does is build a wall. someone can always climb over it, somehow. the question for you is merely do you want a white picket fence? or do you want a 10 foot chain link fence with barbed wire on top?

    locks on doors merely keep honest people honest. anyone determined to break into your house will find a way

    don't invest your energy in a failed concept: i can have absolute security. you can't, it's always an arms race, forever
    • You are absolutely right about the arms race. While you have physical security of the machine hacking on the RAM is unlikely.

      Additionally, it might be good to remember that the PC architecture has a lot to do with the options you have for securing the machine. If your CPU allows physical separation of user memory and machine use memory there are more options. In fact, you can build a kind of sandbox for the machine to run inside of in a protected way. If your encryption is hardware based, it's possible to p
    • It rather depends... (Score:3, Interesting)

      by jd ( 1658 )
      ...on how you define "absolute". A one-time pad cannot be broken, even if you had a theoretically infinitely fast computer. (It would decrypt to every possible string of the same length with equal probability, with no means of telling which one was the one you wanted.) If you want to add extra security, then introduce a negotiated random offset into the pad and a negotiated random step-size.

      Is that absolute security? Well, an outsider couldn't break the encryption. To do so requires the pad. There are no

  • Very real concern (Score:5, Interesting)

    by Deagol ( 323173 ) on Thursday February 21, 2008 @12:07PM (#22504198) Homepage
    I run my FreeBSD (7.0RC3) system with some geli-encrypted volumes, and one-time encrypted swap and /tmp. Very little data can leak out to non-encrypted space (yeah, /var/tmp is one).

    However, for grins one day, I decided to run "dd if=/dev/mem bs=1m count=[mem size] | strings | grep [whatever]" and found not only various passwords, but URLs for sites visited *weeks* ago, even after reboots. So, I installed the "secure_delete" port and ran "smem". No luck -- some stuff got wiped, but some remained in memory. So I booted to a memtest86 CD-ROM, and ran the full test (this test does all kinds of writes/reads to memory). Then, I booted *back* to the normal system, and I was *still* able to recover juicy bits from /dev/mem. WTF?

    We need a kernel module for the common OSes that can encrypt virtual pages (is that the right term?) so that whether in core or paged, they won't be vulnerable.

    • Re:Very real concern (Score:5, Informative)

      by Cruicky ( 1122359 ) on Thursday February 21, 2008 @01:17PM (#22505338)
      If you are running "dd if=/dev/mem bs=1m count=[mem size] | strings | grep [whatever]" on the machine, your search term will be stored in memory, so you are certain to get a result. You would need to take a memory dump, then run strings on that instead, preferably after it's been transferred to another machine.
      • Re: (Score:3, Interesting)

        by Deagol ( 323173 )
        Indeed -- however, I am not *that* dense. ;)

        It's pretty easy to tell, though, that if you do my procedure and grep for "example" then see "http://www.example.com" in the result, which hasn't been visited in weeks/days (even after reboots and power-downs), then it's clearly appears to be lingering in RAM.

        Someone mentioned browser cache, but that's set to be cleared each time Firefox is loaded. Perhaps file system slack space is the culprit here.

        Someone else mentioned the VFS cache, which I don't know

  • by gillbates ( 106458 ) on Thursday February 21, 2008 @12:07PM (#22504200) Homepage Journal

    we know of no simple remedy that would eliminate them...

    As part of a secure programming course I recently took, we were instructed to overwrite keys with zeros when done using them. It's that simple - you don't leave the key in memory for any longer than you need it.

    When the machine is powered down, your application's exit routine zeros all of the memory, and then free()s it. Nothing that good programming practices can't address.

    Generally speaking, it's the keys on the disk(!) that are the problem. Without two factor authentication, you need merely to scan disk sectors...

  • Countermeasure here: (Score:5, Interesting)

    by jetmarc ( 592741 ) on Thursday February 21, 2008 @12:07PM (#22504210)
    This attack is very powerful.

    It's not possible to "clear the DRAM" (as others have suggested), because the attacker will boot his own CD and not give control to your OS after the reset. Thus you won't be able to clear anything.

    Anything? Not so quick, my dear! For the CD to boot, first there is the BIOS. And BIOS needs memory as well (for the menus, the screen, the ElToro floppy image etc).

    Now the countermeasure is obvious: Keep the sensitive key material in memory areas that is erased during the early boot procedure. Then the attack complexity is raised from "no hardware required" to "specicialists hardware necessary, no guarantees given".

    It might seem difficult to find out which memory is of that category. But it isn't, either! Just prepare two boot CDs. One that fills all memory with a known pattern (eg 0x55). Boot it. Then reset and insert the second CD, which identifies all memory areas that have lost the known pattern. These areas have either suffered DRAM fade, or they have been overwritten during the BIOS boot process. Use heuristics to find out which of the two was the cause. Done!

    As simple as that.

    Regards,
    Marc
    • Anything? Not so quick, my dear! For the CD to boot, first there is the BIOS. And BIOS needs memory as well (for the menus, the screen, the ElToro floppy image etc). Now the countermeasure is obvious: Keep the sensitive key material in memory areas that is erased during the early boot procedure. Then the attack complexity is raised from "no hardware required" to "specicialists hardware necessary, no guarantees given".

      I'm pretty sure you can manufacture a specialist DRAM read/dump module for a tens of dollars in China. So while it would be for specialists, access to such hardware will be available and at relatively low costs. So it won't stop the people you're trying to protect your from.

  • Dirty fix (Score:2, Insightful)

    by Anonymous Coward
    Solder RAM to board.
    Password the BIOS, boot only from local disk.
  • Already Screwed (Score:4, Interesting)

    by immcintosh ( 1089551 ) <slashdot.ianmcintosh@org> on Thursday February 21, 2008 @12:11PM (#22504256) Homepage
    If somebody has the kind of access to cut power to your system and then immediately reboot with a malicious thumb drive, they probably have enough access to install something like an inconspicuous hardware keylogger, which I would be much MUCH more worried about than this if you're doing something sensitive enough to warrant it.

    And aside from that, couldn't you just encrypt the important parts of your memory and swap as well as your hard drive? Seems like that would defeat this quite handily, and again, if I were doing something so sensitive I'd probably be taking such precautions.

    Honestly though, aside from people doing stuff like maybe international or corporate espionage, I can't imagine where any of this would be a problem.
  • Full memory encryption. Set a chip on the memory buss, it encrypts/decrypts all the data as it passes between the CPU and RAM chips. At first this would be something like old MMUs before they were built into the CPU itself. They sit on the address bus and add/subtract offsets. This would sit on the data bus and do some simple crypto. Put a capacitor right next to it, first time the chip powers up it selects a random key, when the motherboard looses power the capacitor keeps the chip running long enough

  • I pulled a PIC-4 uP out from a circuit. The DRAM stayed non-refeshed for 2 minutes...
  • ... at least those that are worth their money. What was unknown is the exact amount of time you have and what can be done to extend it. Interesting reseacht for those alone. The basic vulnerability has been known for a long, long time.

    Fix: None, really. Just don't overestimate the capabilities an attacker needs to get your data. Also note, that if a computer has been switched off for some time, the risk fades. Protecting laptop disks with disk encryption is not a lot less secure now and still a good idea.
  • by Animats ( 122034 ) on Thursday February 21, 2008 @12:26PM (#22504484) Homepage

    Easy fix: install a BIOS/boot ROM with a non-bypassable memory test of all memory. This will clear all memory at power-up before reading the boot device.

  • Put the key in SRAM. (Score:3, Interesting)

    by Skapare ( 16644 ) on Thursday February 21, 2008 @12:38PM (#22504690) Homepage

    Put the key in a small piece of SRAM. When it gets used to encrypt something, be sure the place of its usage gets wiped back off real fast to minimize the chance of it being exposed to the cold attack. Split data up with different keys for different data, so if a key is exposed, only a minimal amount of data is lost. Another option is to double or triple encrypt the data being sure never to have more than one key at a time in DRAM.

    So where do we get this SRAM? A CPU register that is not used, and not saved, for any current purpose is one possible place. For a large amount of SRAM, check out your video card buffer.

  • Simple fix, no? (Score:4, Insightful)

    by rickb928 ( 945187 ) on Thursday February 21, 2008 @12:39PM (#22504698) Homepage Journal
    Make the BIOS clear RAM on power-up.

    Wait, doesn't it already?

    Wait, did the researchers bypass BIOS?

    Well, if they did, then adding some crap to DRAM to kill it on power loss is the only way. Probably.

    It was once an axiom of system security, that if you gained physical access, all was lost. This evolved from keyboard and console attacks to floppy- and CD-boot attacks, USB keys, stealing the hard drive, you know the drill.

    Ultimately, if you can cart away pieces of the machine, your last line of defense is gone.

    The only other variable to control is time. Make the DRAM die quicker, or is it time for a 'better' memory technology?

    And this is such great stuff, the TEMPEST guys will now have to re-write their procedures, with both a power-off and wait 30 seconds, and a re-power-on and wait for login prompt, then shutdown again.

    Sometimes I hate h@xrs, and sometimes I realize they do me a service, albeit while they intend to just do me.

    How ironic. My captcha is 'honest'. This cannot be coincidence.

  • DRM attack vector (Score:5, Insightful)

    by crow ( 16139 ) on Thursday February 21, 2008 @12:46PM (#22504804) Homepage Journal
    While an issue for whole-disk encryption, this is also an issue for DRM. Just flick the power while the interesting media is being decrypted, and even if the OS had been protecting the key in some "safe" location, you can now find it. It might be little more tricky, but if you can pull the RAM on a video game console, you can do the same thing.
  • by ComputerPhreak ( 1057874 ) on Thursday February 21, 2008 @12:53PM (#22504922)
    To everyone saying 'if someone has physical access you're hosed anyway'... that simply isn't true. If you have a laptop and encrypt your data correctly, it was thought that it was mathematically infeasible to recover the data if your laptop was stolen. But with this (new?) technique, if it works well enough to be reliable, you could still be fucked even if you took the precaution of encrypting everything.
  • by this great guy ( 922511 ) on Thursday February 21, 2008 @12:54PM (#22504940)

    This is yet another attack that the developer of loop-AES [sourceforge.net] thought about while typically every other disk encryption tool out there is vulnerable. Loop-AES is the 3rd most popular disk encryption tool in Linux. See the KEYSCRUB=y option in its README file [sourceforge.net]:

    If you want to enable AES encryption key scrubbing, specify KEYSCRUB=y on make command line. Loop encryption key scrubbing moves and inverts key bits in kernel RAM so that the thin oxide which forms the storage capacitor dielectric of DRAM cells is not permitted to develop detectable property. For more info, see Peter Gutmann's paper [cypherpunks.to].

    I have used loop-AES as a full disk encryption tool on my laptop for 2+ years. I am glad I took the time to carefully research which tool would the most secure before deploying it ! For example even TrueCrypt and dm-crypt are vulnerable to other (arguably minor) security issues that loop-AES is impervious to: http://article.gmane.org/gmane.linux.cryptography/2321 [gmane.org]

    Surprisingly, the research paper TFA talks about doesn't even directly mention loop-AES (its name only happens to be in the title of a webpage in the reference section describing a safe suspend/resume setup when using disk encryption).

    • Re: (Score:3, Informative)

      Presumably, moving bits around in memory doesn't help in this case because the exact memory image is retained. Additionally, the code that moves the bits around is also present, making it straightforward to locate the bits and reassemble the key.
    • Re: (Score:3, Informative)

      by Mike1024 ( 184871 )
      This is yet another attack that the developer of loop-AES thought about while typically every other disk encryption tool out there is vulnerable. [...] "Loop encryption key scrubbing moves and inverts key bits in kernel RAM so that the thin oxide which forms the storage capacitor dielectric of DRAM cells is not permitted to develop detectable property. For more info, see Peter Gutmann's paper."

      I'm afraid it doesn't. Here is the code from Gutmann's paper:

      Flipping:

      while( TRUE )
      {
      acquire keyMutex;
      key ^= 1111..

  • Epoxy (Score:3, Insightful)

    by Bender0x7D1 ( 536254 ) on Thursday February 21, 2008 @01:28PM (#22505508)

    It seems like the best defense would be applying epoxy to the memory so it couldn't be removed from the slot. If you make sure all the connections are covered as well, they wouldn't be able to place a tap, either. (At least without a lot of time being spent slowly drilling through the epoxy.)

    It would make it impossible to replace your memory, but you could always move the HD to another system. If you care that much, then you should be willing to pay for a new system if someone tries to compromise your data.

  • Sony IBM Cell (Score:5, Interesting)

    by epine ( 68316 ) on Thursday February 21, 2008 @01:33PM (#22505574)
    I'm surprised no one has mentioned the Cell processor yet. I guess everyone hates it.

    The first power word that a toddler learns is "mine!" It's the capstone to a complete working vocabulary: mommy, daddy, more, enough, and mine. My laptop, my hardware, my data, my privacy. The word "mine" has a direct bypass to the neurological circuit "you can't make me", which as adults lingers as a deeply-rooted fascination with rubber-hose cryptography, and bravado propositions such as "if the Feds bust through your windows". Wrong answer.

    Let's look at this from Sony's perspective: my media, my hardware, my design, my copyright, my profits. But guess what? They have a small physical access problem. Millions of zit faced kids with access to liquid nitrogen can get their paws inside the PS3.

    This is why an entire SPU is locked down on the PS3 for security / DRM purposes. The SPU contains 256K of SRAM which is carefully guarded. The instruction set is synchronous and deterministic to guard against timing attacks. They were aware of power attacks as well. These can be partially mitigated in software for critical routines by executing non-conditional instruction sequences and then discarding the portions of the computation you didn't want. By design, the SPU doesn't dance on the power line the way most modern speculative out-of-order processors do to begin with. You can't use latency effects, because the local SRAM has constant access time. You can't use contention effects because there aren't any below the level of DMA bursts, which are controlled by a companion processor within the SPU. Plus I think it is possible to schedule SPU-SPU and SPU-memory DMA transfers deterministically, if you really need to. None of this was accidental.

    The hardest part of the problem is bootstrapping the secure SPU with the security kernel. I've forgotten how they went about it. There must be some kind of decrypt key buried in the Cell hardware which functions during initial code upload during processor initialization.

    In the long run it might be an unwinnable battle, but the PS3 certainly has a far better facility to maintain data security in the complete absence of hardware security than your average PC.

    Why can't the average hacker Harry wants to enjoy the same security as Sony/IBM, why can't you achieve this? You've already got the PS3 in your living room. Impediment: the secure system init decrypt key is probably burned into the silicon. It's probably a one-way key, so even if you crack the key, you won't be able to encrypt a replacement block of your own code that matches the decrypt key. But let's suppose you break that too. Problem: Sony knows the decrypt key for the SPU initialization sequence. Game over.

    Let's suppose you figure out how to physically change the silicon with an initialization decrypt code known only to yourself. Congratulations, you now enjoy the same protection for your secrets that Sony enjoys for "Untraceable". In doing so, you have now upgraded yourself to a sufficiently threatening fish to swim in a tank in Syria, where your nervous system will be similarly reconfigured.

    Ew, I feel like I've just written the script for "Adaptation".
  • by Adam J. Richter ( 17693 ) on Thursday February 21, 2008 @04:09PM (#22507764)
    I believe that the C3 processor made by VIA and probably other processors in that family allow some of the cache to be configured as SRAM and mapped into physical memory. So, you could store the key in SRAM, which I believe really will lose its data upon power loss, although you may also want to take countermeasures such as those used in loop-AES to avoid detection by physical changes to the chip if key is store for a long time in the same place.

    Newever VIA processors also have some hardware AES support available under Linux, which they call "Padlock. So, if they still retain the SRAM feature, then, at that would make a pretty good choice for the little fanless mini-ITX Linux box that receives your email.

If you didn't have to work so hard, you'd have more time to be depressed.

Working...