Cryptographic key protection against FROST for mobile devices

被引:25
|
作者
Zhang, Xiaosong [1 ,2 ]
Tan, Yu-an [1 ,3 ]
Xue, Yuan [1 ]
Zhang, Quanxin [1 ]
Li, Yuanzhang [1 ]
Zhang, Can [1 ]
Zheng, Jun [1 ,3 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Tangshan Univ, Dept Comp Sci & Technol, Tangshan 063000, Peoples R China
[3] Res Ctr Mass Language Informat Proc & Cloud Comp, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
Key protection; Anti-forensics; Android; Cold boot attacks; AES; FDE; DETERMINING IMAGE BASE; FIRMWARE; ATTACKS;
D O I
10.1007/s10586-016-0721-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the flourish of applications based on the internet of things and cloud computing, privacy issues have been attracting a lot of attentions. Although the increasing use of full disk encryption (FDE) significantly hamper privacy leakage and digital forensics, cold boot attacks have thwarted FDE since forensic recovery of scrambled telephones (FROST), a forensic tool, is proposed. The cryptographic keys which are stored in the mobile devices are inclined to be obtained by FROST. Recent research results have shown CPU-bound encryption methods to resist FROST. However, these methods performs AES encryption solely on CPU registers, whose advantage comes at the cost of encryption speed. This paper, therefore, presents a cryptographic key protection scheme for android devices which prevents FROST from acquiring the key of AES by changing storage location of the key in memory. The storage location of the key is switched to the fixed position where command line parameters will be stored when android boots. Therefore, the key will be covered by command line parameters while the system reboots, which negates FROST from obtaining the key. Compared with the popular CPU-bound encryption methods, our method has less impact on encryption efficiency and employs no additional storage resources.
引用
收藏
页码:2393 / 2402
页数:10
相关论文
共 50 条
  • [1] Cryptographic key protection against FROST for mobile devices
    Xiaosong Zhang
    Yu-an Tan
    Yuan Xue
    Quanxin Zhang
    Yuanzhang Li
    Can Zhang
    Jun Zheng
    [J]. Cluster Computing, 2017, 20 : 2393 - 2402
  • [2] Cryptographic Key Protection in a Cryptoprocessor
    Rajitha, N.
    Sridevi, R.
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 271 - 275
  • [3] PHYSICAL PROTECTION OF CRYPTOGRAPHIC DEVICES
    CLARK, AJ
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1988, 304 : 83 - 93
  • [4] HELICOPTERS AS FROST PROTECTION DEVICES
    MILES, JA
    HINZ, WW
    [J]. TRANSACTIONS OF THE ASAE, 1976, 19 (04): : 672 - &
  • [5] Cryptographic key agreement for mobile radio
    Hassan, AA
    Stark, WE
    Hershey, JE
    Chennakeshu, S
    [J]. DIGITAL SIGNAL PROCESSING, 1996, 6 (04) : 207 - 212
  • [6] PROTECTION AGAINST FROST IN NATURE
    不详
    [J]. NATURWISSENSCHAFTEN, 1983, 70 (02) : 88 - 88
  • [7] FROST PROTECTION USES A VARIETY OF DEVICES
    BEARDEN, BE
    [J]. CALIFORNIA AGRICULTURE, 1980, 34 (07) : 38 - 39
  • [8] HELICOPTERS AS FROST PROTECTION DEVICES.
    Miles, J.A.
    Hinz, W.W.
    [J]. Transactions of the American Society of Agricultural Engineers, 1976, 19 (04): : 672 - 674
  • [9] Energy Consumption of Cryptographic Algorithms in Mobile Devices
    Toldinas, J.
    Damasevicius, R.
    Venckauskas, A.
    Blazauskas, T.
    Ceponis, J.
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (05) : 158 - 161
  • [10] Cryptographic Random Number Generator for Mobile Devices
    Ozkaynak, Fatih
    Ozdemir, Halil Ibrahim
    Ozer, Ahmet Bedri
    [J]. 2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 1733 - 1736