Protecting cryptographic keys from memory disclosure attacks

被引:28
|
作者
Harrison, Keith [1 ]
Xu, Shouhuai [1 ]
机构
[1] Univ Texas, Dept Comp Sci, Dallas, TX 75230 USA
关键词
cryptographic key security; memory disclosure;
D O I
10.1109/DSN.2007.77
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that cryptographic keys are kept absolutely secret. In general this assumption is very difficult to guarantee in real life because computers may be compromised relatively easily. In this paper we investigate a class of attacks, which exploit memory disclosure vulnerabilities to expose cryptographic keys. We demonstrate that the threat is real by formulating an attack that exposed the private key of an OpenSSH server within I minute, and exposed the private key of an Apache HTTP server within 5 minutes. We propose a set of techniques to address such attacks. Experimental results show that our techniques are efficient (i.e., imposing no performance penalty) and effective - unless a large portion of allocated memory is disclosed.
引用
收藏
页码:137 / +
页数:2
相关论文
共 50 条
  • [21] Memory-Efficient Attacks on Small LWE Keys
    Esser, Andre
    Girme, Rahul
    Mukherjee, Arindam
    Sarkar, Santanu
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT IV, 2023, 14441 : 72 - 105
  • [22] Protecting Private Keys of Dilithium Using Hardware Transactional Memory
    Meng, Lingjia
    Fu, Yu
    Zheng, Fangyu
    Ma, Ziqiang
    Wang, Mingyu
    Ye, Dingfeng
    Lin, Jingqiang
    INFORMATION SECURITY, ISC 2023, 2023, 14411 : 288 - 306
  • [23] Economics of Privacy: A Model for Protecting Against Cyber Data Disclosure Attacks
    Miaoui, Yosra
    Boudriga, Noureddine
    Abaoub, Ezzeddine
    THIRD INFORMATION SYSTEMS INTERNATIONAL CONFERENCE 2015, 2015, 72 : 569 - 579
  • [24] WiFaKey: Generating Cryptographic Keys From Face in the Wild
    Dong, Xingbo
    Zhang, Hui
    Lai, Yen Lung
    Jin, Zhe
    Huang, Junduan
    Kang, Wenxiong
    Teoh, Andrew Beng Jin
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2024, 73
  • [25] Protecting Classifiers from Attacks
    Gallego, Victor
    Naveiro, Roi
    Redondo, Alberto
    Insua, David Rios
    Ruggeri, Fabrizio
    STATISTICAL SCIENCE, 2024, 39 (03) : 449 - 468
  • [26] On the feasibility of deriving cryptographic keys from MEMS sensors
    Willers, Oliver
    Huth, Christopher
    Guajardo, Jorge
    Seidel, Helmut
    Deutsch, Peter
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 67 - 83
  • [27] On the feasibility of deriving cryptographic keys from MEMS sensors
    Oliver Willers
    Christopher Huth
    Jorge Guajardo
    Helmut Seidel
    Peter Deutsch
    Journal of Cryptographic Engineering, 2020, 10 : 67 - 83
  • [28] Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panos
    IEEE SECURITY & PRIVACY, 2024,
  • [29] PROTECTING PUBLIC KEYS AND SIGNATURE KEYS
    DENNING, DE
    COMPUTER, 1983, 16 (02) : 27 - 35
  • [30] Keeping cryptographic keys safe
    Gregory S. Kanter
    Prem Kumar
    Nature Photonics, 2007, 1 : 15 - 16