Advanced

Key-hiding on the ARM platform

Nilsson, Alexander LU ; Andersson, Marcus and Axelsson, Stefan (2014) In Digital Investigation 11(SUPPL. 1).
Abstract

To combat the problem of encryption key recovery from main memory using cold boot-attacks, various solutions has been suggested, but most of these have been implemented on the x86 architecture, which is not prevalent in the smartphone market, where instead ARM dominates. One existing solution does exist for the ARM architecture but it is limited to key sizes of 128 bits due to not being able to utilise the full width of the CPU registers used for key storage. We developed a test-implementation of CPU-bound key storage with 256-bit capacity, without using more hardware resources than the previous solution. We also show that access to the key can be restricted for programs executing outside the kernel space.

Please use this url to cite or link to this publication:
author
publishing date
type
Contribution to journal
publication status
published
subject
keywords
ARM, Cold-boot, Computer architecture, Cryptography
in
Digital Investigation
volume
11
issue
SUPPL. 1
publisher
Elsevier Ltd
external identifiers
  • scopus:84899624630
ISSN
1742-2876
DOI
10.1016/j.diin.2014.03.008
language
English
LU publication?
no
id
7385f427-7178-4e2c-af21-07c37a7ff720
date added to LUP
2019-01-21 15:57:56
date last changed
2019-10-29 05:41:49
@article{7385f427-7178-4e2c-af21-07c37a7ff720,
  abstract     = {<p>To combat the problem of encryption key recovery from main memory using cold boot-attacks, various solutions has been suggested, but most of these have been implemented on the x86 architecture, which is not prevalent in the smartphone market, where instead ARM dominates. One existing solution does exist for the ARM architecture but it is limited to key sizes of 128 bits due to not being able to utilise the full width of the CPU registers used for key storage. We developed a test-implementation of CPU-bound key storage with 256-bit capacity, without using more hardware resources than the previous solution. We also show that access to the key can be restricted for programs executing outside the kernel space.</p>},
  author       = {Nilsson, Alexander and Andersson, Marcus and Axelsson, Stefan},
  issn         = {1742-2876},
  keyword      = {ARM,Cold-boot,Computer architecture,Cryptography},
  language     = {eng},
  month        = {01},
  number       = {SUPPL. 1},
  publisher    = {Elsevier Ltd},
  series       = {Digital Investigation},
  title        = {Key-hiding on the ARM platform},
  url          = {http://dx.doi.org/10.1016/j.diin.2014.03.008},
  volume       = {11},
  year         = {2014},
}