The Cold Boot Attack

Get Started. It's Free
or sign up with your email address
The Cold Boot Attack by Mind Map: The Cold Boot Attack

1. the paper

1.1. here

1.2. info

1.3. paper published Thursday February 21st

2. summary

2.1. result

2.1.1. what

2.1.1.1. figured out detailed to get into memory

2.1.1.2. recovery of the encryption key

2.1.1.2.1. and they did some math to recover partially-damaged RSA and AES keys.

2.1.1.2.2. This latter feat they did by looking at scratch variables that the encryption systems use, and back-deducing what some of the damaged bits of the keys must have been. The process is a bit like a big Sudoku game; when you play Sudoku, you deduce what is missing based on what is present.

2.1.1.2.3. What is new is the researchers’ ability to identify cryptographic keys and rebuild them after bits had begun decaying. They were able to reconstruct 128-bit Advanced Encryption Standard keys on which 10 percent of the bits had decayed in a matter of seconds.

2.1.2. why

2.1.2.1. premise is that security info cleared from DRAM when powered off or rebooted

2.1.2.2. information can be extracted for several minutes after shutdown

2.1.2.3. The attack is based on the insight that information stored in modern DRAM chips does not disappear the instant a computer is powered off.

2.1.2.4. If the DRAM chip is removed from the PC and quickly chilled or frozen, all of this data will remain in place long enough for thieves to transfer the chip to another machine.

2.1.2.5. need to keep keys in RAM for efficiency purpose (disk encryption) and so as not to bother the user

2.1.2.5.1. While some keys might not absolutely be needed in RAM for a long term, e.g. keys to decrypt hard disk images are non-trivial to only keep for very short time in memory.

2.1.2.5.2. not just keys but the extended keys

2.1.3. when

2.1.3.1. What is unique about the Cold Boot Attack is that it also works during the period between powering off a computer and a few minutes after shut-down when the information stored in DRAM is actually gone.

2.1.3.2. But the attack does not work on a computer that has been shut down for more than a few minutes or when a computer is hibernated or suspended. (In the latter case, all the data in memory is saved to disk, cleared and the machine is shut down).

2.1.3.3. For the attack to work, the computer would have to first be running or in standby mode.

2.1.3.4. memory modules, even removed from the motherboard, can retain data for seconds to minutes allowing retrieval of the cryptographic keys.

2.1.4. how

2.1.4.1. attach a USB key with an alternate operating system. When the computer is quickly rebooted, the rogue OS grabs all the data lingering in memory and can find encryption keys (and lots of other data) in the resulting file.

2.1.4.2. cool it down get 10 mins

2.1.4.2.1. Cooling chips down to about -58 degrees Fahrenheit (-50 degrees Celsius) gave researchers time to power down the computer and then install the memory in another PC that would boot without wiping out the data. "By cooling the chips we were able to recover data perfectly after 10 minutes or more," Halderman said.

2.1.5. what products work on

2.1.5.1. Windows Vista's BitLocker

2.1.5.2. Apple's FileVault.

2.2. sound bites

2.2.1. Hard drive encryption has Achilles heel

2.2.2. dynamic RAM (DRAM) chips is not quite as dynamic as often thought,

2.2.3. overturned the conventional wisdom that all data held on DRAM chips disappears when a PC is turned off

2.3. reactions

2.3.1. MS

2.3.2. general

2.3.2.1. it is very difficult to secure data when the attacker has physical control of the machine the data is stored on

2.3.2.1.1. Callas still thinks the attack is an "edge condition" attack -- meaning that it's an attack that relies on specific and not-common situations. means boundary condition

2.3.2.2. present works gives details and demo

2.3.2.2.1. present work increases the prob

2.3.2.2.2. but conditional on hacker having physical access to the machine

2.3.2.3. attack is known to exist in principle

2.3.2.3.1. might think of this as a risk with low prob, and med to high seveity

2.3.2.3.2. attack not new per se

2.3.2.4. It is significant to note that this is a hardware attack, not an attack on the encryption tools themselves.

2.3.2.5. Those of us who consider these things have known that this was at least in theory possible for some time. This team did two impressive things: they made it actually work, and they did some math to recover partially-damaged RSA and AES keys.

2.3.2.6. The threat is real, particularly if you are a high-value target with sophisticated enemies lying in wait for your data. But full-disk encryption is not broken, and there are simple ways to mitigate the threat.

2.3.2.7. The cryo-crypto attack is not new. “It’s been in the toolbox of forensics examiners for some time,” said Murugiah Souppaya, a researcher at the National Institute of Standards and Technology.

2.4. mitigation

2.4.1. Despite how dramatic this attack is, there is an easy fix for it. That is to clear the memory in which valuable information is held. The true risks come from software that relies on removing power from memory to clear it. Software that does not explicitly clear memory is at risk.

2.4.2. changes in HW required, may take years to implement as software approach maybe unreliable

2.4.3. The simplest way to protect yourself from this attack is to turn off your computer or put it in hibernation rather than sleep mode before leaving it. This cuts power to the DRAM, and if you stay with the computer for a few seconds before walking away, the memory will have faded enough to protect you. With tools such as BitLocker, you also can improve security by using it in a mode requiring a token to provide additional cryptographic key material. This means that a complete key will not be available on the DRAM.

2.4.4. TPM

2.4.4.1. paper says no but ...

2.5. lessons and issues

2.5.1. The lesson, according to Callas, is that "sleep mode leaves a computer vulnerable in ways we didn't realize."

2.5.2. "Encryption is not magic pixie dust that makes everything okay," Callas said.

2.5.2.1. conclusion; encryption not as strong as thought

2.5.2.1.1. not the silver bullet

2.5.3. what happend to in situ memory keys during changes of machine state?

2.5.3.1. boot

2.5.3.2. run

2.5.3.3. sleep

2.5.3.4. hibernate

2.5.3.5. suspended

2.5.3.6. shutdown

2.5.3.7. off

2.5.4. Bill Burr, manager of the security technology group at NIST’s Information Technology Lab, said the DRAM attack is not an attack on the cryptography itself. Protecting crypto keys will always remain a challenge.

2.5.5. The team's research may spur legislators to rethink that approach, Halderman said. "Maybe that law is placing too much faith in disk encryption technologies," he said. "It may be that we're not hearing about thefts of encrypted machines where that data could still be at risk."

2.5.6. every time the media report on a lost laptop containing some long list of sensitive information that the only questions raised seem to be if the disk was encrypted or not, and why in the latter case.

2.5.6.1. attack surface has expanded

2.5.7. In the future now there should be even more questions that need answers: * How long ago was the laptop turned off ? * Was the laptop turned off, or just asleep? * What encryption product was used and does it wipe its keys from RAM upon shutdown or sleep actions ?

2.6. extensions

2.6.1. code for USB released to extract memory

2.6.2. DaisyDukes

2.6.2.1. extracts passwords for apps as well

2.6.2.2. this just makes things more serious - higher prob

2.6.3. practical cold boot attacks

3. infosources

3.1. unsorted

3.2. why aren't we following a risk based approach?

3.3. bruce

3.3.1. nice work

3.3.2. it is very difficult to secure data when the attacker has physical control of the machine the data is stored on

3.3.3. comments

3.3.3.1. It would seem that having the BIOS do a DRAM "initialize" as part of the POST process would minimize if not render this method moot.

3.3.3.2. The DRAM hold is actually quit old news ands has a fairly simple solution. You build your key dynamicaly into a CPU register imediatly prior to use. The key its self is either never stored in RAM or (due to OS issues) securly over writen imediatly it has been loaded etc.

3.3.3.3. Clive, the problem is you need some serious low level OS and CPU VooDoo to get a piece of memory, even just 256b, that doesn't leave the confines of the cache.

3.3.3.4. It would not be difficult or expensive to equip new CPUs or TPMs with a few KB of very volitile memory for key storage.

3.3.4. it seems that bruce can just make a few remarks and set off a whole debate

3.4. MS

3.4.1. art

3.4.1.1. BitLocker can be protected

3.4.1.2. According to Humphries, the hack is easily prevented. Users can configure BitLocker to prevent a PC from booting, or resuming from hibernation without confirmation of a password or a second key contained on a USB stick.

3.4.1.3. "The thing to keep in mind here is the old adage of balancing security, usability and risk," he wrote. "For example BitLocker provides several options that allow for a user (or more likely Administrator) to increase their security protections but at the cost of somewhat lowering ease-of-use."

3.4.1.4. Humphries also worked to downplay the likelihood that an attack as exotic as this one would work in the trenches or real-world crime. Thieves would first have to get physical access to a machine and the machine would most likely need to be in sleep mode.

3.4.1.5. The Bitlocker attack is a wake-up call for privacy and security buffs because it demonstrated a fundamental weakness in a key tool used to protect sensitive data.

3.4.1.6. there is little that can be done to prevent ghost images from being readily accessed. Software changes are likely to be ineffective, and altering the way hardware works inside a laptop would take years.

3.4.1.6.1. another long tail

3.4.2. MS corp blog

3.5. SANS

3.5.1. vendors

3.5.1.1. 9 of them

3.5.1.2. Ultimaco pdf

3.5.1.2.1. we knew but ...

3.5.1.2.2. give mitigations which protect for most business use

3.5.2. user guide

3.5.2.1. great questions to ask

3.6. seagate comment

3.7. art

3.8. PGP

3.8.1. wired PGP

3.8.1.1. But the attack does not work on a computer that has been shut down for more than a few minutes or when a computer is hibernated or suspended. (In the latter case, all the data in memory is saved to disk, cleared and the machine is shut down).

3.8.1.2. Callas still thinks the attack is an "edge condition" attack -- meaning that it's an attack that relies on specific and not-common situations.

3.8.1.2.1. means boundary condition

3.8.1.3. The lesson, according to Callas, is that "sleep mode leaves a computer vulnerable in ways we didn't realize."

3.8.1.4. "Encryption is not magic pixie dust that makes everything okay," Callas said.

3.8.2. It is significant to note that this is a hardware attack, not an attack on the encryption tools themselves.

3.8.3. What is unique about the Cold Boot Attack is that it also works during the period between powering off a computer and a few minutes after shut-down when the information stored in DRAM is actually gone.

3.8.4. the vulnerability

3.8.4.1. The attack is based on the insight that information stored in modern DRAM chips does not disappear the instant a computer is powered off.

3.8.5. PGP Virtual Disk not only erases the key used from memory, but prevents that key from being readable in any way once the PGP volume is unmounted. Consequently, if a user utilizes PGP Virtual Disk encryption and unmounts the volume when it is not in use, the information on the volume will not be subject to the Cold Boot Attack as described in the Princeton research paper.

3.8.6. CTO comments

3.8.6.1. Those of us who consider these things have known that this was at least in theory possible for some time. This team did two impressive things: they made it actually work, and they did some math to recover partially-damaged RSA and AES keys.

3.8.6.2. This latter feat they did by looking at scratch variables that the encryption systems use, and back-deducing what some of the damaged bits of the keys must have been. The process is a bit like a big Sudoku game; when you play Sudoku, you deduce what is missing based on what is present.

3.8.6.3. Despite how dramatic this attack is, there is an easy fix for it. That is to clear the memory in which valuable information is held. The true risks come from software that relies on removing power from memory to clear it. Software that does not explicitly clear memory is at risk. Memory that has simply been written over is safe. We don't have to do it multiple times or anything special, we just have to clear it.

3.8.6.4. much more comment that I will not put here

3.9. done

3.9.1. art

3.9.1.1. assumption that keys in RAM are erased when turned off

3.9.1.2. memory modules, even removed from the motherboard, can retain data for seconds to minutes allowing retrieval of the cryptographic keys.

3.9.1.3. need to keep keys in RAM for efficiency purpose (disk encryption) and so as not to bother the user

3.9.1.3.1. While some keys might not absolutely be needed in RAM for a long term, e.g. keys to decrypt hard disk images are non-trivial to only keep for very short time in memory.

3.9.1.4. every time the media report on a lost laptop containing some long list of sensitive information that the only questions raised seem to be if the disk was encrypted or not, and why in the latter case.

3.9.1.4.1. attack surface has expanded

3.9.1.5. In the future now there should be even more questions that need answers: * How long ago was the laptop turned off ? * Was the laptop turned off, or just asleep? * What encryption product was used and does it wipe its keys from RAM upon shutdown or sleep actions ?

3.9.2. art

3.9.2.1. Data in these DRAM (dynamic RAM) processors disappears when the computer is turned off, but it turns out that this doesn't happen right away,

3.9.2.1.1. decays

3.9.2.1.2. secs to mins

3.9.2.2. For the attack to work, the computer would have to first be running or in standby mode.

3.9.2.3. really gone after a few mins

3.9.2.4. also works when steal laptop and reboot

3.9.2.4.1. previous RAM image may not be wiped

3.9.2.5. cool it down get 10 mins

3.9.2.5.1. Cooling chips down to about -58 degrees Fahrenheit (-50 degrees Celsius) gave researchers time to power down the computer and then install the memory in another PC that would boot without wiping out the data. "By cooling the chips we were able to recover data perfectly after 10 minutes or more," Halderman said.

3.9.2.6. rethink laws

3.9.2.6.1. The team's research may spur legislators to rethink that approach, Halderman said. "Maybe that law is placing too much faith in disk encryption technologies," he said. "It may be that we're not hearing about thefts of encrypted machines where that data could still be at risk."

3.9.2.7. conclusion; encryption not as strong as thought

3.9.2.7.1. not the silver bullet

3.9.3. shift keys off OS

3.9.3.1. use TPM

3.9.4. key extraction via USB

3.9.5. what's new and what is not in the attack