Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Android Security

Unscrambling an Android Telephone With FROST 55

Noryungi writes "Researchers at the University of Erlangen demonstrate how to recover an Android phone's confidential content, with the help of a freezer and FROST, a specially-crafted Android ROM. Quite an interesting set of pictures, starting with wrapping your Android phone in a freezer bag."
This discussion has been archived. No new comments can be posted.

Unscrambling an Android Telephone With FROST

Comments Filter:
  • by DFurno2003 ( 739807 ) on Thursday February 14, 2013 @09:30AM (#42895285)
    Polaroids Get it?
  • by nefus ( 952656 ) on Thursday February 14, 2013 @09:44AM (#42895409) Homepage
    As far back as the late 1980's we used freezer's on hard-drives to recover data. It helped against various over-heating issues so you could recover just a little bit more data each time you used the drive. Every few years you hear about some other method to recover data with a freezer including putting a device in the freezer. Funny how it always works. All hail the freezer!
    • Re: (Score:2, Funny)

      by Anonymous Coward

      You can't handle the stone cold truth.

    • Honestly, My refrigerator comes in 2nd in my life, just after the dog, and before the wife.
    • by Anonymous Coward on Thursday February 14, 2013 @10:09AM (#42895635)

      To expand on why this works.
      The RAM in a phone is dynamic RAM.
      It does not store data when unpowered, but needs that data to be periodically refreshed many times a second.
      It turns out, that especially when cooled, the RAM may in fact retain information for some period short enough to allow the device to be unpowered and repowered, and essentially retain all its data. (there may be a few errors).

      This, combined with booting into a new OS which then allows you to dump or do other things to the RAM enables the attack.

      • by CanHasDIY ( 1672858 ) on Thursday February 14, 2013 @10:18AM (#42895713) Homepage Journal

        FTR, this concept was demonstrated by Darren Kitchen on a 2009 episode of Hak5. [hak5.org]

      • It turns out, that especially when cooled, the RAM may in fact retain information for some period short enough to allow the device to be unpowered and repowered, and essentially retain all its data. (there may be a few errors).

        Actually, the period can be quite significant. One of my projects involved a kernel that could only dump messages to RAM. To get it out, I'd reboot the board and dump the log buffer. At regular room temperature, but elevated board temperature (jthe CPU was running for a good tilt so the board heated up), a power cycle (under 1s) would let you read it out perfectly. After 10s off, you could see corruption but was mostly readable. After 30s or so, it was barely readable.

        It appears the main physical phenomena is that the memory capacitors "distort" ever so slightly so the RAM doesn't completely powerup randomly, but is influenced by what was held there previously. It's a time related thing as well - a memory cell that was rapidly cycled would tend to have a lower time before corruption than a cell which held data staticly for a long time. Since encryption keys tend to fall in the latter, the memory tends to stay that way a bit longer (unless the code periodically switches memory buffers and scrubs the old one - it doesn't take much - just store a new pattern in then and it'll overwrite the old one).

        Sections 7 and 8 of the famous Gutmann paper [auckland.ac.nz] detail this effect in memory as well (you may recall the paper dealt with recovery of data off hard drives - but it also dealt with semiconductor nonvolatile memory as well).

        A followup paper(PDF) [cypherpunks.to] goes into more detail on semiconductor memory including flash storage.

        • by mlts ( 1038732 )

          I remember this being described years ago in PGP Desktop's [1] owner's manual. What the PGP program (pgpserv.exe) did was keep two copies of RAM resident keys, one normal, one bit-inverted (XOR all 1s.) Periodically the program would flip the copies.

          [1]: When PGP, the commercial product was split from McAfee and was run by an independent company before becoming part of Symantec.

    • by jader3rd ( 2222716 ) on Thursday February 14, 2013 @10:11AM (#42895647)
      We should ask Han Solo if it works as well with human memory too.
      • by Anonymous Coward

        We should ask Han Solo if it works as well with human memory too.

        Of course it does. Didn't you know that is why people are blind for a short time after being removed from carbonite? It is so that forensic investigators can retrieve information from their visual cortex and optic nerves before it gets overwritten. Also hibernation sickness is caused by overheating in the brain caused by bulk memcpy grabbing all the data from the person's memory.

    • I can't talk about your non-volatile storage issues, but cooling a system down slows state change, meaning it's more likely to stay in its current state for longer. This means you have more time to recover whatever it is you're looking for before the volatile nature of the system means the data is lost for good.
    • by EdZ ( 755139 )
      The two work by different methods.
      In the case of RAM, reducing the temperature lowers the leakage current of the capacitors in DRAM that actually store your bits, increasing the time before the charge drops below a detectable level (i.e. increasing the time before the data becomes unreadable).
      In the case of HDDs, freezing them causes metal components to shrink slightly, so any seized bearings may be freed up for long enough to recover data.
  • Amazing! (Score:4, Funny)

    by crashumbc ( 1221174 ) on Thursday February 14, 2013 @09:56AM (#42895525)

    People with physical access to a device and time, can overcome security...

    Some one call the press!

    • Re:Amazing! (Score:5, Insightful)

      by Anonymous Coward on Thursday February 14, 2013 @10:05AM (#42895603)

      I guess the point is that this is an unnecessary hole in the security. The boot loader should not load anything without first wiping the RAM. The attack depends on the ability to boot into fastboot mode, which is then used for flashing a new recovery ROM, and that is booted as well without clearing the RAM. There is no normal situation where a booting system should have access to the previous RAM contents, so wiping the RAM first thing in the boot loader is a safe thing to do.

      • by Anonymous Coward

        Some embedded systems use RAM for crash log for recovery, so while it does not make sense in a mobile, it is used and really useful in real life. Writing to RAM is at least 2 order of magnitudes faster than FLASH and not you do not have to have to worry about wear cycles.

      • They acknowledge that bootloader must be unlocked for this to work though. That's really going to limit the utility of their procedure. Non-Nexus bootloaders are generally locked and encrypted, and the ADB whitelist feature of 4.2.2 should make stock Nexus devices a tough target.
        • They acknowledge that bootloader must be unlocked for this to work though. That's really going to limit the utility of their procedure. Non-Nexus bootloaders are generally locked and encrypted, and the ADB whitelist feature of 4.2.2 should make stock Nexus devices a tough target.

          Even Nexus devices ship with locked bootloaders by default. They can be unlocked by a simple ADB command, but this erases everything on the device.

      • Wiping the RAM each boot is a waste of time - nobody does that. I'd rather have the normal scenario be "boot quicker", not "protect me from an unreasonable scenario *if I've already unlocked my bootloader*"

        If for some reason you need that extra security unlock the bootloader and replace it with one that wipes the RAM on boot. But you still won't be secure from the guy that just wires into the RAM chips directly and dumps them.

  • by Anonymous Coward

    Quite possibly the best line
    "To break disk encryption, the bootloader must be unlocked before the attack because scrambled user partitions are wiped during unlocking."

    • So what you're saying is, if I build a secret compartment inside my neighbour's house and camp out there, I can beat him to the doormat in the morning and read all his mail? For free?
  • if ever anything did!

  • by j-turkey ( 187775 ) on Thursday February 14, 2013 @11:10AM (#42896171) Homepage
    Admittedly, I have never used Android device encryption and do not know the specifics of how it works. However, reading the article, what is the big deal about brute forcing a 4-digit PIN on a device that one has local access to? Could the encrypted FS be dumped and brute forced in software? What am I missing?
    • To answer my own question, my assertion was correct [blogspot.com]. With physical access to the device, brute forcing the PIN protecting the disk encryption is trivial. The million dollar question is: how to sufficiently protect a key in a manner that can be quickly and conveniently unlocked by an average user?

"If the code and the comments disagree, then both are probably wrong." -- Norm Schryer

Working...