Protect your crypto key from the cold

 

Connecting state and local government leaders

New software suite can defend computers against cold boot attacks.

LAS VEGAS'The report in February from the Princeton Center for IT Policy that data stored in Dynamic Random Access Memory (DRAM) chips is longer-lived than commonly believed had a chilling effect on the cryptography community.Tools have been developed that can recover encryption keys from DRAM if you can get access to the computer quickly enough after it has been powered down. Data in DRAM can be made even more stable by cooling down the chips, giving a forensics analyst or a thief minutes or even hours to recover those keys, rather than seconds.This technique of accessing slowly fading memory is called a cold boot attack.'This contradicted the assumption that everyone has about what happens when you turn your computer off,' said Patrick McGregor, chief executive officer of BitArmor Systems Inc. of Pittsburgh. 'With a click of the power button the information [is supposed to] dissipate. But it doesn't. When it comes to encryption, this is a problem.'But not to worry. BitArmor has developed a software suite to defend against cold boot attacks. McGregor, who has a doctorate from Princeton and has done cryptographic research with some of the authors of the cold boot report, demonstrated those tools yesterday at the Black Hat Briefings. They have not been formally announced, but they are being incorporated in the company's DataControl product, an endpoint data protection and management system.The problem of persistent DRAM memory is not entirely new and the forensics community has been aware of it for some time, according to computer security experts at the National Institute of Standards and Technology. But general knowledge of it and the availability of tools that can recover keys make it a problem, McGregor said. 'This is a big deal.'Disk encryption, which can be compromised by these attacks, is an increasingly important tool in protecting data from improper exposure. According to some estimates, as much as $200 million was spent on disk encryption tools in 2007.'Most experts assume that a computer's memory is erased almost immediately when it loses power, or that whatever data remains is difficult to retrieve without specialized equipment,' the researchers write in their report, titled 'Lest We Remember: Cold Boot Attacks on Encryption Keys.' 'We show that these assumptions are incorrect. Ordinary DRAM chips typically lose their contents gradually over a period of seconds, even at standard operating temperatures and even if the chips are removed from the motherboard, and data will persist for minutes or even hours if the chips are kept at low temperatures.'By chilling chips to prolong memory and using algorithms to recognize and recover cryptographic keys, researchers were able to defeat several disk encryption systems, including BitLocker, TrueCrypt and FileVault.The researchers built their work on the known fact that system memory persists for a matter of seconds after power is removed from the DRAM. 'In most cases, we observed that almost all bits decayed at predictable times and to predictable 'ground states' rather than to random values,' they wrote. 'We also confirmed that decay rates vary dramatically with temperature.'Discharging a compressed air keyboard duster directly onto the chip lowered the temperature to 50 degrees below zero Celsius (-58 degrees Fahrenheit). 'At these temperatures, we typically found that fewer than 1 percent of bits decayed even after 10 minutes without power. To test the limits of this effect, we submerged DRAM modules in liquid nitrogen (ca. -196 C) and saw decay of only 0.17 percent after 60 minutes out of the computer.'Using algorithms, researchers were able to reconstruct 128-bit AES keys on which 10 percent of the bits had decayed in a matter of seconds. They also developed reconstruction techniques for DES and RSA keys.Key recovery does not have to rely on super-chilled chips if a thief can get his hands on a computer that has merely been put in a sleep or hibernation mode. Because power remains on in sleep mode, data remains in the chips. A thief with software tools on a USB device can reboot the stolen computer, cutting power to the chips for just a blink, and then recover persistent data before it has a chance to decay.With this type of attack, 'your chances of success are about 100 percent,' McGregor said.To date, defense against cold boot attacks have focused on behavior: Turn your computer off when not in use rather than relying on the sleep mode, and keep your eyes on it for several minutes.BitArmor has incorporated software in DataControl that defends against four avenues of attack. It can securely overwrite memory and purge keys from DRAM before the system is powered down; if booted to another operating system it can overwrite keys before rebooting; and it can create a secure enclave in Pentium chips to hold keys secure from a cold boot attack. For computers that have temperature sensors, originally intended to protect against overheating, it can use those sensors to detect chilling and respond by purging keys.Although not yet announced, the software is included in the DataControl agent that resides on a protected client. The feature has to be turned on by the policy administrator but does not require any other policy configuration.

NEXT STORY: 12 Microsoft patches coming

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.