Protecting cryptographic keys from memory disclosure attacks

被引:28
|
作者
Harrison, Keith [1 ]
Xu, Shouhuai [1 ]
机构
[1] Univ Texas, Dept Comp Sci, Dallas, TX 75230 USA
关键词
cryptographic key security; memory disclosure;
D O I
10.1109/DSN.2007.77
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that cryptographic keys are kept absolutely secret. In general this assumption is very difficult to guarantee in real life because computers may be compromised relatively easily. In this paper we investigate a class of attacks, which exploit memory disclosure vulnerabilities to expose cryptographic keys. We demonstrate that the threat is real by formulating an attack that exposed the private key of an OpenSSH server within I minute, and exposed the private key of an Apache HTTP server within 5 minutes. We propose a set of techniques to address such attacks. Experimental results show that our techniques are efficient (i.e., imposing no performance penalty) and effective - unless a large portion of allocated memory is disclosed.
引用
收藏
页码:137 / +
页数:2
相关论文
共 50 条
  • [41] DISTRIBUTION OF CRYPTOGRAPHIC KEYS TO ENHANCE CONVENIENCE
    MIYAGUCHI, S
    MORITA, H
    SUGITA, M
    NTT REVIEW, 1994, 6 (02): : 12 - 14
  • [42] GENERATION, DISTRIBUTION, AND INSTALLATION OF CRYPTOGRAPHIC KEYS
    MATYAS, SM
    MEYER, CH
    IBM SYSTEMS JOURNAL, 1978, 17 (02) : 126 - 137
  • [43] Cryptographic keys generation using FingerCodes
    Ramirez-Ruiz, Jose A.
    Pfeiffer, Carlos F.
    Nolazco-Flores, Juan A.
    ADVANCES IN ARTIFICIAL INTELLIGENCE - IBERAMIA-SBIA 2006, PROCEEDINGS, 2006, 4140 : 178 - 187
  • [44] CRYPTOGRAPHIC KEYS FOR IMPROVING THE RELIABILITY OF CIPHERS
    KOSCIELNY, C
    MOCHNACKI, W
    COMPUTER COMMUNICATIONS, 1991, 14 (09) : 557 - 561
  • [45] Securing Cryptographic Keys in the Cloud: A Survey
    AlBelooshi, Bushra
    Damiani, Ernesto
    Salah, Khaled
    Martin, Thomas
    IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +
  • [46] Security of biased sources for cryptographic keys
    Mihailescu, P
    CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 287 - 302
  • [47] PGP cryptographic keys and key rings
    Crainicu, Bogdan
    Marusteri, Marius
    5th RoEduNet IEEE International Conference, Proceedings, 2006, : 138 - 141
  • [48] Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks
    Karmous, Nader
    Hizem, Moez
    BEN Dhiab, Yassmine
    Aoueileyine, Mohamed OULD-ELHASSEN
    Bouallegue, Ridha
    Youssef, Neji
    RADIOENGINEERING, 2024, 33 (04) : 583 - 592
  • [49] 4 KEYS TO INFORMATION DISCLOSURE
    LEAHY, RA
    LABOR LAW JOURNAL, 1978, 29 (07) : 420 - 424
  • [50] Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads
    Tang, Adrian
    Sethumadhavan, Simha
    Stolfo, Salvatore
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 256 - 267