Protecting cryptographic keys from memory disclosure attacks

被引:28
|
作者
Harrison, Keith [1 ]
Xu, Shouhuai [1 ]
机构
[1] Univ Texas, Dept Comp Sci, Dallas, TX 75230 USA
关键词
cryptographic key security; memory disclosure;
D O I
10.1109/DSN.2007.77
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that cryptographic keys are kept absolutely secret. In general this assumption is very difficult to guarantee in real life because computers may be compromised relatively easily. In this paper we investigate a class of attacks, which exploit memory disclosure vulnerabilities to expose cryptographic keys. We demonstrate that the threat is real by formulating an attack that exposed the private key of an OpenSSH server within I minute, and exposed the private key of an Apache HTTP server within 5 minutes. We propose a set of techniques to address such attacks. Experimental results show that our techniques are efficient (i.e., imposing no performance penalty) and effective - unless a large portion of allocated memory is disclosed.
引用
收藏
页码:137 / +
页数:2
相关论文
共 50 条
  • [31] Keeping cryptographic keys safe
    Kanter, Gregory S.
    Kumar, Prem
    NATURE PHOTONICS, 2007, 1 (01) : 15 - 16
  • [32] Intelligent Management of the Cryptographic Keys
    Moise, G.
    Cangea, O.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (01) : 150 - 157
  • [33] Controlling the use of cryptographic keys
    Holloway, CJ
    COMPUTERS & SECURITY, 1995, 14 (07) : 587 - 598
  • [34] Protecting secret keys in networked devices with table encoding against power analysis attacks
    Kim, Taesung
    Lee, Seungkwang
    Choi, Dooho
    Yoon, Hyunsoo
    JOURNAL OF HIGH SPEED NETWORKS, 2016, 22 (04) : 293 - 307
  • [35] You are the Key: Generating Cryptographic Keys from Voice Biometrics
    Carrara, Brent
    Adams, Carlisle
    PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 213 - 222
  • [36] Generation of replaceable cryptographic keys from dynamic handwritten signatures
    Yip, WK
    Goh, A
    Ngo, DCL
    Teoh, ABJ
    ADVANCES IN BIOMETRICS, PROCEEDINGS, 2006, 3832 : 509 - 515
  • [37] Protecting databases from inference attacks
    Hinke, Thomas H.
    Delugach, Harry S.
    Wolf, Randall P.
    Computers and Security, 1997, 16 (08): : 687 - 708
  • [38] Protecting databases from inference attacks
    Hinke, TH
    Delugach, HS
    Wolf, RP
    COMPUTERS & SECURITY, 1997, 16 (08) : 687 - 708
  • [39] RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
    Zhao, Yuan
    Lin, Jingqiang
    Pan, Wuqiong
    Xue, Cong
    Zheng, Fangyu
    Ma, Ziqiang
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 293 - 307
  • [40] Cryptographic keys generation using FingerCodes
    Ramírez-Ruiz, José A.
    Pfeiffer, Carlos F.
    Nolazco-Flores, Juan A.
    Lect. Notes Comput. Sci., (178-187):