Feeds

Security boffins attempt to freeze out cold boot crypto attack

Cache from chaos

The Essential Guide to IT Transformation

Security researchers have developed prototype countermeasures to defend against the recently developed cold boot crypto attack.

Cold boot is a technique for snatching cryptographic keys from memory, creating a means to circumvent disk encryption. A targeted machine that's been left hibernating would be turned off and quickly rebooted using an external hard drive, loaded with customised software, in order to extract encryption keys stored in memory.

The technique works because DRAM circuits used in modern PCs retain data for a short time after they are powered down, contrary to popular opinion. Cold boot attacks are of potential interest to both hackers and computer forensics experts.

Crypto boffins are on the way to defending against the attack. By saving cryptographic keys in CPU cache, instead of potentially vulnerable DRAM, the attack can potentially be frustrated.

"By switching the cache into a special mode one can force that data remains in the cache and is not written to the backing RAM locations," write the security researchers behind the Frozen Cache blog. "Thus, the encryption key can't be extracted from RAM. This technique is actually not new: LinuxBIOS/CoreBoot calls this Cache-as-RAM. They use it to allow "RAM access", even before the memory controller is initialized."

The researchers have developed a proof-of-concept implementation of the defence that works under Linux but many problems remain, particularly in recovering from hibernation.

"Disabling/freezing the CPU's cache severely degrades the performance," the researchers write.

"However, this seems acceptable if one considers that this special mode only needs to be set whenever the screen is locked (all efforts are pretty much worthless if an unlocked laptop is stolen). A very first proof-of-concept test on Linux shows that there's quite a bit of performance optimization necessary to make even just the act of unlocking the GUI an acceptable experience (from a performance/usability perspective)."

Other factors, such as developing an approach for machines with multi-core CPUs, as well as optimisation (fine-tweaking) problems remain to be addressed. Interested parties can follow the evolution of the idea through the Frozen Cache blog here. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.