Protecting sensitive information in the volatile memory from disclosure attacks

被引:7
|
作者
Malliaros, Stefanos [1 ]
Ntantogian, Christoforos [1 ]
Xenakis, Christos [1 ]
机构
[1] Univ Piraeus, Dept Digital Syst, Piraeus, Greece
关键词
Memory zeroization; Volatile memory; Operating Systems; memory management; Information disclosure;
D O I
10.1109/ARES.2016.75
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The protection of the volatile memory data is an issue of crucial importance, since authentication credentials and cryptographic keys remain in the volatile memory. For this reason, the volatile memory has become a prime target for memory scrapers, which specifically target the volatile memory, in order to steal sensitive information, such as credit card numbers. This paper investigates security measures, to protect sensitive information in the volatile memory from disclosure attacks. Experimental analysis is performed to investigate whether the operating systems (Windows or Linux) perform data zeroization in the volatile memory. Results show that Windows kernel zeroize data after a process termination, while the Linux kernel does not. Next, we examine functions and software techniques in C/C++ programming language that can be used by developers to modify at process runtime the contents of the allocated blocks in the volatile memory. We have identified that only the Windows operating system provide a specific function named SecureZeroMemory that can reliably zeroize data. Finally, driven by the fact that malware scrapers primarily target web browsers, we examine whether it is feasible to extract authentication credentials from the volatile memory allocated by web browsers. The presented results show that in most cases we can successfully recover user authentication credentials from all the web browsers except when the user has closed the tab that used to access the website.
引用
收藏
页码:687 / 693
页数:7
相关论文
共 50 条
  • [21] Enhancing the controlled disclosure of sensitive information
    Marks, D.G.
    Motro, A.
    Jajodia, S.
    1996, (1146):
  • [22] Protecting databases from inference attacks
    Hinke, Thomas H.
    Delugach, Harry S.
    Wolf, Randall P.
    Computers and Security, 1997, 16 (08): : 687 - 708
  • [23] Side Channel Attacks and the Non Volatile Memory of the Future
    Dyka, Zoya
    Walcyk, Christian
    Walczyk, Damian
    Wenger, Christian
    Langendoerfer, Peter
    CASES'12: PROCEEDINGS OF THE 2012 ACM INTERNATIONAL CONFERENCE ON COMPILERS, ARCHITECTURES AND SYNTHESIS FOR EMBEDDED SYSTEMS, 2012, : 13 - 15
  • [24] Confidentiality and adolescents' disclosure of sensitive information.
    Ford, CA
    Millstein, SG
    HalpernFelsher, B
    Irwin, CE
    PEDIATRIC RESEARCH, 1996, 39 (04) : 9 - 9
  • [25] Protecting databases from inference attacks
    Hinke, TH
    Delugach, HS
    Wolf, RP
    COMPUTERS & SECURITY, 1997, 16 (08) : 687 - 708
  • [26] Confidentiality and adolescents' disclosure of sensitive information.
    Ford, CA
    Millstein, SG
    HalpernFelsher, B
    Irwin, CE
    JOURNAL OF ADOLESCENT HEALTH, 1996, 18 (02) : 111 - 111
  • [27] InfoClean: Protecting Sensitive Information in Data Cleaning
    Chiang, Fei
    Gairola, Dhruv
    ACM JOURNAL OF DATA AND INFORMATION QUALITY, 2018, 9 (04):
  • [28] RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
    Zhao, Yuan
    Lin, Jingqiang
    Pan, Wuqiong
    Xue, Cong
    Zheng, Fangyu
    Ma, Ziqiang
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 293 - 307
  • [29] Information Systems Security Measures and Countermeasures: Protecting Organizational Assets from Malicious Attacks
    Alshboul, Abdullah
    KNOWLEDGE MANAGEMENT AND INNOVATION IN ADVANCING ECONOMIES-ANALYSES & SOLUTIONS, VOLS 1-3, 2009, : 595 - 603
  • [30] Mechanisms for protecting sensitive information in cloud computing
    Gershoni, Tomer
    Mowbray, Miranda
    Pearson, Siani
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2013, 28 (06): : 357 - 376