FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption

被引:1
作者
Franzen, Fabian [1 ]
Andreas, Manuel [1 ]
Huber, Manuel [2 ]
机构
[1] Tech Univ Munich, Munich, Germany
[2] Fraunhofer AISEC, Garching, Germany
来源
PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020 | 2020年
关键词
D O I
10.1145/3374664.3375747
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To secure mobile devices, such as laptops and smartphones, against unauthorized physical data access, employing Full Disk Encryption (FDE) is a popular defense. This technique is effective if the device is always shut down when unattended. However, devices are often suspended instead of switched off. This leaves confidential data such as the FDE key, passphrases and user data in RAM which may be read out using cold boot, JTAG or DMA attacks. These attacks can be mitigated by encrypting the main memory during suspend. While this approach seems promising, it is not implemented on Windows or Linux. We present FridgeLock to add memory encryption on suspend to Linux. Our implementation as a Linux Kernel Module (LKM) does not require an admin to recompile the kernel. Using Dynamic Kernel Module Support (DKMS) allows for easy and fast deployment on existing Linux systems, where the distribution provides a prepackaged kernel and kernel updates. We tested our module on a range of 4.19 to 5.3 kernels and experienced a low performance impact, sustaining the system's usability. We hope that our tool leads to a more detailed evaluation of memory encryption in real world usage scenarios.
引用
收藏
页码:215 / 219
页数:5
相关论文
共 25 条
[1]  
Apple Inc, 2019, iOS Security-iOS 12.3
[2]  
Blass EO, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P71
[3]  
Corner Mark D., 2002, P 8 ANN INT C MOB CO
[4]   Protecting applications with transient authentication [J].
Corner, MD ;
Noble, BD .
PROCEEDINGS OF MOBISYS 2003, 2003, :57-70
[5]   CryptoPage: an efficient secure architecture with memory encryption, integrity and information leakage protection [J].
Duc, Guillaume ;
Keryell, Ronan .
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, :483-+
[6]   HyperCrypt: Hypervisor-based Encryption of Kernel and User Space [J].
Goetzfried, Johannes ;
Doerr, Nico ;
Palutke, Ralph ;
Mueller, Tilo .
PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, :79-87
[7]   RamCrypt: Kernel-based Address Space Encryption for User-mode Processes [J].
Goetzfried, Johannes ;
Mueller, Tilo ;
Drescher, Gabor ;
Nurnberger, Stefan ;
Backes, Michael .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :919-924
[8]  
Gotzfried Johannes, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P161, DOI 10.1109/ARES.2013.23
[9]  
Gotzfried J., 2014, JOWUA, V5, P84
[10]   Copker: Computing with Private Keys without RAM [J].
Guan, Le ;
Lin, Jingqiang ;
Luo, Bo ;
Jing, Jiwu .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,