Protecting cryptographic keys from memory disclosure attacks

被引:28
|
作者
Harrison, Keith [1 ]
Xu, Shouhuai [1 ]
机构
[1] Univ Texas, Dept Comp Sci, Dallas, TX 75230 USA
关键词
cryptographic key security; memory disclosure;
D O I
10.1109/DSN.2007.77
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that cryptographic keys are kept absolutely secret. In general this assumption is very difficult to guarantee in real life because computers may be compromised relatively easily. In this paper we investigate a class of attacks, which exploit memory disclosure vulnerabilities to expose cryptographic keys. We demonstrate that the threat is real by formulating an attack that exposed the private key of an OpenSSH server within I minute, and exposed the private key of an Apache HTTP server within 5 minutes. We propose a set of techniques to address such attacks. Experimental results show that our techniques are efficient (i.e., imposing no performance penalty) and effective - unless a large portion of allocated memory is disclosed.
引用
收藏
页码:137 / +
页数:2
相关论文
共 50 条
  • [1] A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks
    Parker, T. Paul
    Xu, Shouhuai
    TRUSTED SYSTEMS, 2010, 6163 : 39 - 59
  • [2] Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory
    Guan, Le
    Lin, Jingqiang
    Luo, Bo
    Jing, Jiwu
    Wang, Jing
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 3 - 19
  • [4] Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory
    Li, Congwu
    Le Guan
    Lin, Jingqiang
    Luo, Bo
    Cai, Quanwei
    Jing, Jiwu
    Wang, Jing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1196 - 1213
  • [5] Protecting sensitive information in the volatile memory from disclosure attacks
    Malliaros, Stefanos
    Ntantogian, Christoforos
    Xenakis, Christos
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 687 - 693
  • [6] Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks
    Yang, Yang
    Guan, Zhi
    Liu, Zhe
    Chen, Zhong
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 49 - 60
  • [7] Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 898 - 905
  • [8] A Scattering Technique for Protecting Cryptographic Keys in the Cloud
    Mohamed, Fatma
    AlBelooshi, Bushra
    Salah, Khaled
    Yeun, Chan Yeob
    Damiani, Ernesto
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 301 - 306
  • [9] Protecting Cryptographic Keys against Continual Leakage
    Juma, Ali
    Vahlis, Yevgeniy
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 41 - 58
  • [10] Protecting cryptographic keys: The trace-and revoke approach
    Naor, D
    Naor, M
    COMPUTER, 2003, 36 (07) : 47 - +