Recovery of encryption keys from memory using a linear scan

被引:29
作者
Hargreaves, Christopher [1 ]
Chivers, Howard [1 ]
机构
[1] Cranfield Univ, Cranfield MK43 0AL, Beds, England
来源
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY | 2008年
关键词
D O I
10.1109/ARES.2008.109
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As encrypted containers are encountered more frequently the need for live imaging is likely to increase. However, an acquired live image of an open encrypted file system cannot later be verified against any original evidence, since when the power is removed the decrypted contents are no longer accessible. This paper shows that if a memory image is also obtained at the same time as the live container image, by the design of on-the-fly encryption, decryption keys can be recovered from the memory dump. These keys can then be used offline to gain access to the encrypted container file, facilitating standard, repeatable, forensic file system analysis. The recovery method uses a linear scan of memory to generate trial keys from all possible memory positions to decrypt the container. The effectiveness of this approach is demonstrated by recovering TrueCrypt decryption keys from a memory dump of a Windows XP system.
引用
收藏
页码:1369 / 1376
页数:8
相关论文
共 28 条
[1]   Live forensics: Diagnosing your system without killing it first [J].
Adelstein, F .
COMMUNICATIONS OF THE ACM, 2006, 49 (02) :63-66
[2]  
[Anonymous], 2002, INT J DIGITAL EVIDEN
[3]  
[Anonymous], 2001, CATHEDRAL BAZAAR
[4]  
BARRETT N, 2005, DEAL STRONG ENCRYPTI
[5]  
BOLIEAU A, BIOSKBSNARF
[6]  
Carrier B., 2005, File System Forensic Analysis
[7]  
CARVEY H, 2007, WINDOWS FORENSIC ANA, P87
[8]  
Casey Eoghan., 2004, DIGITAL EVIDENCE COM, V2nd
[9]  
CRAIGER JP, 2005, LAW ENFORCEMENT DIGI
[10]  
Denning D., 1999, Information Warfare and Security