ABSTRACT
Smartphones and tablets are easily lost or stolen. This makes them susceptible to an inexpensive class of memory attacks, such as cold-boot attacks, using a bus monitor to observe the memory bus, and DMA attacks. This paper describes Sentry, a system that allows applications and OS components to store their code and data on the System-on-Chip (SoC) rather than in DRAM. We use ARM-specific mechanisms originally designed for embedded systems, but still present in today's mobile devices, to protect applications and OS subsystems from memory attacks.
- Fast models. http://www.arm.com/products/tools/models/fast-models/index.php. Accessed: 2014--12--10.Google Scholar
- ARM security technology -- building a secure system using trustzone technology. http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf, 2005--2009.Google Scholar
- PL310 cache controller reference manual, 2007. http://infocenter.arm.com/help/topic/com.arm.doc.ddi0246a/DDI0246A_l2cc_pl310_r0p0_trm.pdf.Google Scholar
- Procedure Call Standard for the ARM Architecture. http://infocenter.arm.com/help/topic/com.arm.doc.ihi0042e/IHI0042E_aapcs.pdf, 2012.Google Scholar
- T. T. Athonen and A. Moore. Commununities dominate brands. http://communities-dominate.blogs.com/brands/2013/03/. Accessed: 2014--12--10.Google Scholar
- A. Baumann, M. Peinado, and G. Hunt. Shielding applications from an untrusted cloud with haven. In Proc. of the 11th Symposium on Operating System Design and Implementation (OSDI), Broomfield, CO, 2014. Google ScholarDigital Library
- M. Becher, M. Dornseif, and C. N. Klein. Firewire - all your memory are belong to us. In Proc. of CanSecWest Applied Security Conference, 2005.Google Scholar
- R. Bittner. Personal Communication, April 2014.Google Scholar
- A. Boileau. Hit by a bus: Physical access attacks with firewire. In Proc. of 4th Annual Ruxcon Conference, 2006.Google Scholar
- C. Cakir, M. Bhargava, and K. Mai. 6T SRAM and 3T DRAM data retention and remanence characterization in 65nm bulk CMOS. In Custom Integrated Circuits Conference (CICC), 2012.Google ScholarCross Ref
- E. M. Chan, J. C. Carlyle, F. M. David, R. Farivar, and R. H. Campbell. Bootjacker: compromising computers using forced restarts. In Proceedings of the 15th ACM conference on Computer and communications security (CCS). Google ScholarDigital Library
- Chen, Dick, and Choudhary}chen08X. Chen, R. P. Dick, and A. Choudhary. Operating system controlled processor-memory bus encryption. In Proceedings of the conference on Design, automation and test in Europe, 2008. Google ScholarDigital Library
- Chen, Garfinkel, Lewis, Subrahmanyam, Waldspurger, Boneh, Dwoskin, and Ports}overshadowX. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. K. Ports. Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. In Proc. of 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Seattle, WA, 2008. Google ScholarDigital Library
- M. D. Corner and B. D. Noble. Zero-interaction authentication. In Proc. of the 8th Annual International conference on Mobile computing and networking (Mobicom), 2002. Google ScholarDigital Library
- M. D. Corner and B. D. Noble. Protecting applications with transient authentication. In Proc. of the 1st International Conference on Mobile systems, applications and services (MobiSys), 2003. Google ScholarDigital Library
- J. Criswell, N. Dautenhahn, and V. Adve. Virtual ghost: Protecting applications from hostile operating systems. In Proc. of 19th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2014. Google ScholarDigital Library
- O. H. A. Dunn, S. Kim, M. Lee, and E. Witchel. Inktag: Secure applications on an untrusted operating system. In Proc. of 18th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2013. Google ScholarDigital Library
- EPN Solutions. Analysis tools for DDR1, DDR2, DDR3, embedded DDR and fully buffered DIMM modules. http://www.epnsolutions.net/ddr.html. Accessed: 2014--12--10.Google Scholar
- Filebench. Filebench: File system benchmark. http://sourceforge.net/projects/filebench/. Accessed: 2014--12--10.Google Scholar
- Freescale Semiconductor. Configuring secure JTAG for the i.MX 6 series family of applications processors. http://cache.freescale.com/files/32bit/doc/eng_bulletin/AN4686.pdf, 2013.Google Scholar
- FuturePlus System. DDR2 800 bus analysis probe. http://www.futureplus.com/download/datasheet/fs2334_ds.pdf, 2006.Google Scholar
- T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A Virtual Machine-Based Platform for Trusted Computing. In Proc. of 19th ACM Symposium on Operating Systems Principles (SOSP), Lake George, NY, 2003. Google ScholarDigital Library
- et al.(2011)Geambaşu, John, Gribble, Kohno, and Levy.}GJGKL11R. Geambaşu, J. P. John, S. D. Gribble, T. Kohno, and H. M. Levy. Keypad: An Auditing File System for Theft-prone Devices. In Proc. of the European Conference on Computer Systems (EuroSys), 2011. Google ScholarDigital Library
- G. Gogniat, T. Wolf, W. Burleson, J.-P. Diguet, L. Bossuet, and R. Vaslin. Reconfigurable hardware for high-security/high-performance embedded systems: The SAFES perspective. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16 (2): 144--155, 2008. Google ScholarDigital Library
- J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Proc. of the 17th USENIX Security Symposium, 2008. Google ScholarDigital Library
- ig et al.(2005)H\"artig, Hohmuth, Feske, Helmuth, orzynski, Mehnert, and Peter}nizzaH. Hartig, M. Hohmuth, N. Feske, C. Helmuth, A. L. orzynski, F. Mehnert, and M. Peter. The Nizza secure-system architecture. In Proc. of 1st International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2005.Google ScholarCross Ref
- Intel. Software Guard Extensions Programming Reference. https://software.intel.com/sites/default/files/329298-001.pdf, 2013.Google Scholar
- V. Keranen. Cryptographic algorithm benchmarking in mobile devices. Technical Report Master's Thesis, University of Oulu, 2013.Google Scholar
- J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB Reduction and Attestation. In Proc. of IEEE Symposium on Security and Privacy, Oakland, CA, May 2010. Google ScholarDigital Library
- Microsoft. BitLocker Drive Encryption. http://windows.microsoft.com/en-us/windows7/products/features/bitlocker.Google Scholar
- T. Müller and M. Spreitzenbarth. FROST - forensic recovery of scrambled telephones. In Proc. of the International Conference on Applied Cryptography and Network Security (ACNS), 2013. Google ScholarDigital Library
- T. Müller, A. Dewald, and F. C. Freiling. AESSE: a cold-boot resistant implementation of AES. In Proc. of the 3rd European Workshop on System Security (EUROSEC), 2010. Google ScholarDigital Library
- T. Müller, A. Dewald, and F. Freiling. TRESOR runs encryption securely outside RAM. In Proc. of the 20th USENIX Security Symposium, 2011. Google ScholarDigital Library
- NIST. Pub. 197 -- advanced encryption standard (AES). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, 2001.Google Scholar
- P. A. Peterson. Cryptkeeper: Improving security with encrypted RAM. In Proc. of IEEE International Conference on Technologies for Homeland Security, 2010.Google Scholar
- D. R. Piegdon. Hacking in physically addressable memory - a proof of concept. Presentation to the Seminar of Advanced Exploitation Techniques, 2006.Google Scholar
- H. Raj, D. Robinson, T. Tariq, P. England, S. Saroiu, and A. Wolman. Credo: Trusted computing for guest VMs with a commodity hypervisor. Technical Report MSR-TR-2011--130, 2011.Google Scholar
- Riff Box. http://www.riffbox.org/, 2014. Accessed: 2014--12--10.Google Scholar
- N. Santos, H. Raj, S. Saroiu, and A. Wolman. Using ARM TrustZone to build a trusted language runtime for mobile applications. In Proc. of 19th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2014. Google ScholarDigital Library
- F. B. Schneider, K. Walsh, and E. G. Sirer. Nexus Authorization Logic (NAL): Design Rationale and Applications. ACM Transactions on Information and System Security, 14 (1), 2011. Google ScholarDigital Library
- P. Simmons. Security through amnesia: A software-based solution to the cold boot attack on disk encryption. In Proc. of the 27th Annual Computer Security Applications Conference (ACSAC), 2011. Google ScholarDigital Library
- E. G. Sirer, W. de Bruijn, P. Reynolds, A. Shieh, K. Walsh, D. Williams, and F. B. Schneider. Logical attestation: An authorization architecture for trustworthy computing. In Proc. of 23rd ACM Symposium on Operating Systems Principles (SOSP), 2011. Google ScholarDigital Library
- S. Skorobogatov. Low temperature data remanence in static RAM. Technical Report UCAM-CL-TR-536, University of Cambridge, Computer Laboratory, 2002.Google Scholar
- J. Sorber, M. Shin, R. Peterson, and D. Kotz. Plug-n-Trust: Practical trusted sensing for mHealth. In Proc. of the International Conference on Mobile Systems, Applications, and Services (MobiSys), 2012. Google ScholarDigital Library
- U. Steinberg and B. Kauer. NOVA: A microhypervisor-based secure virtualization architecture. In Proc. of European Conference on Computer Systems (Eurosys), 2010. Google ScholarDigital Library
- STMicroelectronics. STM32F205/215, STM32F207/217 Flash programming manual. http://www.st.com/st-web-ui/static/active/en/resource/technical/document/programming_manual/CD00233952.pdf, 2013.Google Scholar
- R. Ta-Min, L. Litty, and D. Lie. Splitting interfaces: Making trust between applications and operating systems configurable. In Proc. of the 7th Symposium on Operating System Design and Implementation (OSDI), 2006. Google ScholarDigital Library
- and Sarda}TAB12Y. Tang, P. Ames, S. Bhamidipati, A. Bijlani, R. Geambaşu, and N. Sarda. CleanOS: Limiting mobile data exposure with idle eviction. In Proc. of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2012. Google ScholarDigital Library
- C. Tarnovsky. Attacking hardware: Unsecuring {once} secure devices. Black Hat USA Training Session, 2009.Google Scholar
- E. Tromer, D. A. Osvik, and A. Shamir. Efficient cache attaks on AES, and countermeasures. Journal of Cryptology, 23 (1): 37--31, 2010. Google ScholarDigital Library
- TrueCrypt. Truecrypt -- free open source disc encryption software. http://www.truecrypt.org/. Accessed: 2014-04-01; Product and website retired on: 2014-05--28.Google Scholar
- F. Zhang, J. Chen, H. Chen, and B. Zang. CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In Proc. of 23rd ACM Symposium on Operating Systems Principles (SOSP), 2011. Google ScholarDigital Library
Index Terms
- Protecting Data on Smartphones and Tablets from Memory Attacks
Recommendations
Protecting Data on Smartphones and Tablets from Memory Attacks
ASPLOS'15Smartphones and tablets are easily lost or stolen. This makes them susceptible to an inexpensive class of memory attacks, such as cold-boot attacks, using a bus monitor to observe the memory bus, and DMA attacks. This paper describes Sentry, a system ...
Protecting Data on Smartphones and Tablets from Memory Attacks
ASPLOS '15Smartphones and tablets are easily lost or stolen. This makes them susceptible to an inexpensive class of memory attacks, such as cold-boot attacks, using a bus monitor to observe the memory bus, and DMA attacks. This paper describes Sentry, a system ...
Cache attacks and countermeasures: the case of AES
CT-RSA'06: Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in CryptologyWe describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache. This leakage reveals memory access patterns, which can be used for cryptanalysis of cryptographic primitives that employ data-...
Comments