Protecting sensitive information in the volatile memory from disclosure attacks

被引:7
|
作者
Malliaros, Stefanos [1 ]
Ntantogian, Christoforos [1 ]
Xenakis, Christos [1 ]
机构
[1] Univ Piraeus, Dept Digital Syst, Piraeus, Greece
关键词
Memory zeroization; Volatile memory; Operating Systems; memory management; Information disclosure;
D O I
10.1109/ARES.2016.75
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The protection of the volatile memory data is an issue of crucial importance, since authentication credentials and cryptographic keys remain in the volatile memory. For this reason, the volatile memory has become a prime target for memory scrapers, which specifically target the volatile memory, in order to steal sensitive information, such as credit card numbers. This paper investigates security measures, to protect sensitive information in the volatile memory from disclosure attacks. Experimental analysis is performed to investigate whether the operating systems (Windows or Linux) perform data zeroization in the volatile memory. Results show that Windows kernel zeroize data after a process termination, while the Linux kernel does not. Next, we examine functions and software techniques in C/C++ programming language that can be used by developers to modify at process runtime the contents of the allocated blocks in the volatile memory. We have identified that only the Windows operating system provide a specific function named SecureZeroMemory that can reliably zeroize data. Finally, driven by the fact that malware scrapers primarily target web browsers, we examine whether it is feasible to extract authentication credentials from the volatile memory allocated by web browsers. The presented results show that in most cases we can successfully recover user authentication credentials from all the web browsers except when the user has closed the tab that used to access the website.
引用
收藏
页码:687 / 693
页数:7
相关论文
共 50 条
  • [1] Protecting cryptographic keys from memory disclosure attacks
    Harrison, Keith
    Xu, Shouhuai
    37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 137 - +
  • [2] Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks
    Yang, Yang
    Guan, Zhi
    Liu, Zhe
    Chen, Zhong
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 49 - 60
  • [3] Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory
    Guan, Le
    Lin, Jingqiang
    Luo, Bo
    Jing, Jiwu
    Wang, Jing
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 3 - 19
  • [5] Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory
    Li, Congwu
    Le Guan
    Lin, Jingqiang
    Luo, Bo
    Cai, Quanwei
    Jing, Jiwu
    Wang, Jing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1196 - 1213
  • [6] Protecting Data on Smartphones and Tablets from Memory Attacks
    Colp, Patrick
    Zhang, Jiawen
    Gleeson, James
    Suneja, Sahil
    de Lara, Eyal
    Raj, Himanshu
    Saroiu, Stefan
    Wolman, Alec
    ACM SIGPLAN NOTICES, 2015, 50 (04) : 177 - 189
  • [7] Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks
    Zhang, Mingwei
    Polychronakis, Michalis
    Sekar, R.
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 128 - 140
  • [8] Information Leakage Attacks on Emerging Non-Volatile Memory and Countermeasures
    Khan, Mohammad Nasim Imtiaz
    Ghosh, Swaroop
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN (ISLPED '18), 2018, : 140 - 145
  • [9] Information Disclosure and the Diffusion of Information Security Attacks
    Mitra, Sabyasachi
    Ransbotham, Sam
    INFORMATION SYSTEMS RESEARCH, 2015, 26 (03) : 565 - 584
  • [10] A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks
    Parker, T. Paul
    Xu, Shouhuai
    TRUSTED SYSTEMS, 2010, 6163 : 39 - 59