Key-hiding on the ARM platform
2014 (English)In: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 11, no Supplement 1, S63-S67 p.Article in journal (Refereed) Published
To combat the problem of encryption key recovery from main memory using cold boot-attacks, various solutions has been suggested, but most of these have been implemented on the x86 architecture, which is not prevalent in the smartphone market, where instead ARM dominates. One existing solution does exist for the ARM architecture but it is limited to key sizes of 128 bits due to not being able to utilise the full width of the CPU registers used for key storage. We developed a test-implementation of CPU-bound key storage with 256-bit capacity, without using more hardware resources than the previous solution. We also show that access to the key can be restricted for programs executing outside the kernel space.
Place, publisher, year, edition, pages
Elsevier , 2014. Vol. 11, no Supplement 1, S63-S67 p.
cold-boot, cryptography, computer architechture, ARM
IdentifiersURN: urn:nbn:se:bth-6664DOI: 10.1016/j.diin.2014.03.008ISI: 000335438900008Local ID: oai:bth.se:forskinfoEAA76B6DFD8A9D1EC1257CDA003124ACOAI: oai:DiVA.org:bth-6664DiVA: diva2:834188
Special issue of the journal Digital Investigation (The proceedings of the first annual DFRWS Europe conference)2014-07-172014-05-162015-06-30Bibliographically approved