Protecting sensitive information in the volatile memory from disclosure attacks

被引:7
|
作者
Malliaros, Stefanos [1 ]
Ntantogian, Christoforos [1 ]
Xenakis, Christos [1 ]
机构
[1] Univ Piraeus, Dept Digital Syst, Piraeus, Greece
关键词
Memory zeroization; Volatile memory; Operating Systems; memory management; Information disclosure;
D O I
10.1109/ARES.2016.75
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The protection of the volatile memory data is an issue of crucial importance, since authentication credentials and cryptographic keys remain in the volatile memory. For this reason, the volatile memory has become a prime target for memory scrapers, which specifically target the volatile memory, in order to steal sensitive information, such as credit card numbers. This paper investigates security measures, to protect sensitive information in the volatile memory from disclosure attacks. Experimental analysis is performed to investigate whether the operating systems (Windows or Linux) perform data zeroization in the volatile memory. Results show that Windows kernel zeroize data after a process termination, while the Linux kernel does not. Next, we examine functions and software techniques in C/C++ programming language that can be used by developers to modify at process runtime the contents of the allocated blocks in the volatile memory. We have identified that only the Windows operating system provide a specific function named SecureZeroMemory that can reliably zeroize data. Finally, driven by the fact that malware scrapers primarily target web browsers, we examine whether it is feasible to extract authentication credentials from the volatile memory allocated by web browsers. The presented results show that in most cases we can successfully recover user authentication credentials from all the web browsers except when the user has closed the tab that used to access the website.
引用
收藏
页码:687 / 693
页数:7
相关论文
共 50 条
  • [41] Protecting databases from query flood attacks
    Squicciarini, Anna Cinzia
    Paloscia, Ivan
    Bertino, Elisa
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 1358 - +
  • [42] Protecting infrastructure performance from disinformation attacks
    Saeed Jamalzadeh
    Kash Barker
    Andrés D. González
    Sridhar Radhakrishnan
    Scientific Reports, 12
  • [43] Protecting Browsers from DNS Rebinding Attacks
    Jackson, Collin
    Barth, Adam
    Bortz, Andrew
    Shao, Weidong
    Boneh, Dan
    ACM TRANSACTIONS ON THE WEB, 2009, 3 (01)
  • [44] Protecting infrastructure performance from disinformation attacks
    Jamalzadeh, Saeed
    Barker, Kash
    Gonzalez, Andres D.
    Radhakrishnan, Sridhar
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [45] Policy Proposals for Protecting Unclassified but Sensitive Information in China
    Yang, Yanhong
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 746 - 751
  • [46] Protecting Sensitive Customer Information in Call Center Recordings
    Faruquie, Tanveer A.
    Negi, Sumit
    Subramaniam, L. Venkata
    2009 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, 2009, : 81 - 88
  • [47] Mandatory information disclosure and innovation: Evidence from the disclosure of operational information
    Liu, Jinyang
    Ye, Kangtao
    Liu, Yurou
    CHINA JOURNAL OF ACCOUNTING RESEARCH, 2023, 16 (02)
  • [48] Mandatory information disclosure and innovation:Evidence from the disclosure of operational information
    Jinyang Liu
    Kangtao Ye
    Yurou Liu
    China Journal of Accounting Research, 2023, (02) : 69 - 88
  • [49] Extraction of forensically sensitive information from windows physical memory
    Hejazi, S. M.
    Talhi, C.
    Debbabi, M.
    DIGITAL INVESTIGATION, 2009, 6 : S121 - S131
  • [50] Protecting shared information in networks: A network security game with strategic attacks
    de Witte, Bram
    Frasca, Paolo
    Overvest, Bastiaan
    Timmer, Judith
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4255 - 4277