NextPVR Forums
  • ______
  • Home
  • New Posts
  • Wiki
  • Members
  • Help
  • Search
  • Register
  • Login
  • Home
  • Wiki
  • Members
  • Help
  • Search
NextPVR Forums General General Discussion v
« Previous 1 … 73 74 75 76 77 … 159 Next »
Laptops In Sleep/hiber Mode Vulnerable To Attack, Flaw in encryption technologies

 
  • 0 Vote(s) - 0 Average
Laptops In Sleep/hiber Mode Vulnerable To Attack, Flaw in encryption technologies
pcostanza
Offline

Posting Freak

Posts: 3,778
Threads: 270
Joined: Oct 2004
#1
2008-02-22, 02:00 PM (This post was last modified: 2008-02-22, 02:05 PM by pcostanza.)
San Francisco - A team including the Electronic Frontier Foundation (EFF), Princeton University, and other researchers have found a major security flaw in several popular disk encryption technologies that leaves encrypted data vulnerable to attack and exposure.

"People trust encryption to protect sensitive data when their computer is out of their immediate control," said EFF Staff Technologist Seth Schoen, a member of the research team. "But this new class of vulnerabilities shows it is not a sure thing. Whether your laptop is stolen, or you simply lose track of it for a few minutes at airport security, the information inside can still be read by a clever attacker."

The researchers cracked several widely used disk encryption technologies, including Microsoft's BitLocker, Apple's FileVault, TrueCrypt, and dm-crypt. These "secure" disk encryption systems are supposed to protect sensitive information if a computer is stolen or otherwise accessed. However, in a paper and video published on the Internet today, the researchers show that data is vulnerable because encryption keys and passwords stored in a computer's temporary memory -- or RAM -- do not disappear immediately after losing power.

"These types of attacks were often though to be in the realm of the NSA," said Jacob Appelbaum, an independent computer security researcher and member of the research team. "But we discovered that on most computers, even without power applied for several seconds, data stored in RAM seemed to remain when power was reapplied, We then wrote programs to collect the contents of memory after the computers were rebooted."

Laptops are particularly vulnerable to this attack, especially when they are turned on but locked, or in a "sleep" or "hibernation" mode entered when the laptop's cover is shut. Even though the machines require a password to unlock the screen, the encryption keys are already located in the RAM, which provides an opportunity for attackers with malicious intent.

The research released today shows that these attacks are likely to be effective against many other disk encryption systems because these technologies have many architectural features in common. Servers with encrypted hard drives are also vulnerable.

"We've broken disk encryption products in exactly the case when they seem to be most important these days: laptops that contain sensitive corporate data or personal information about business customers," said J. Alex Halderman, a Ph.D. candidate in Princeton's computer science department. "Unlike many security problems, this isn't a minor flaw; it is a fundamental limitation in the way these systems were designed."

In addition to Schoen, Appelbaum, and Halderman, the research team included William Paul of Wind River Systems, and Princeton graduate students Nadia Heninger, William Clarkson, Joseph Calandrino, Ariel Feldman as well as Princeton Professor Edward Felten, the director of the Center for Information Technology Policy and a member of EFF's Board of Directors.

The researchers have submitted the paper for publication and it is currently undergoing review. In the meantime, the researchers have contacted the developers of BitLocker, which is included in some versions of Windows Vista, Apple's FileVault, and the open source TrueCrypt and dm-crypt products, to make them aware of the vulnerability. One effective countermeasure is to turn a computer off entirely, though in some cases even this does not provide protection.

For the full paper "Lest We Remember: Cold Boot Attacks on Encryption Keys," a demonstration video, and other background information:
http://citp.princeton.edu/memory/

http://www.eff.org/press/archives/2008/02/21-0


Video and more info here:
http://www.youtube.com/watch?v=JDaicPIgn...s-dis.html

Researchers with Princeton University and the Electronic Frontier Foundation have found a flaw that renders disk encryption systems useless if an intruder has physical access to your computer -- say in the case of a stolen laptop or when a computer is left unattended on a desktop in sleep mode or while displaying a password prompt screen.

The attack takes only a few minutes to conduct and uses the disk encryption key that's stored in the computer's RAM.

The attack works because content as well as encryption keys stored in RAM linger in the system, even after the machine is powered off, enabling an attacker to use the key to collect any content still in RAM after reapplying power to the machine.

"We've broken disk encryption products in exactly the case when they seem to be most important these days: laptops that contain sensitive corporate data or personal information about business customers," said J. Alex Halderman, one of the researchers, in a press release. "Unlike many security problems, this isn't a minor flaw; it is a fundamental limitation in the way these systems were designed."

The researchers successfully performed the attack on several disk encryption systems -- Apple's FileVault, Microsoft's BitLocker, as well as TrueCrypt and dm-crypt -- but said they have no reason to believe it won't work on other disk encryption systems as well, since they all share similar architectures.

They released a paper about their work as well as a video demonstration of the attack (below).


Paul


Custom ASUS Maximus X Hero, 16 GB Memory-ASUS GeForce 1050 Ti, H115i Pro AIO, 850W PS, CM H500P case, Corsair Vengeance RGB Ram, Samsung 970 EVO, HDHomerun Prime & Extend  Tuners- running Windows 10 (and other goodies)
bdgbill
Offline

Senior Member

Posts: 329
Threads: 88
Joined: Aug 2005
#2
2008-02-22, 03:34 PM
I read this article. It seems pretty complicated to me. If you have information on your laptop that is going to attract super hackers or international spies you probably shouldn't be leaving it sitting around.

Even if you do everything correctly with this hack, if the owner of the computer had not logged in very recently the pasword will not still be sitting on the ram.

I did think it was cool that RAM actually holds some information when powered off. I always understood the opposite.
AMD Athlon II 630 on Asus mobo
XP Pro
2 Gigs DDR3
PVR 150
200 g HD (OS and Programs)
1 TB Recordings Drive
Asus Integrated Graphics with HDMI out
Harmony 659 Remote
Scientific Atlanta Explorer 3200 STB dedicated to GBPVR
Schedules Direct EPG Service
prouton
Offline

Member

Posts: 110
Threads: 10
Joined: Feb 2007
#3
2008-02-23, 05:39 AM
While active or in suspend (low power) mode, RAM memory does hold its contents. It cannot hold its contents when in full hibernation mode, as there is zero power being supplied to the memory chips.

The problem lies with the fact that whenever hibernation mode kicks in, the first thing that happens is that the contents of RAM are written to a file on the hard drive. Resumption from hibernation is simply the act of reloading RAM from that file.

The exposure, or flaw, is that the hibernation file remains on the hard drive until overwritten by the next entry into hibernation mode.
[SIZE="2"][COLOR="Gray"]PVR-2 Generic Box (512MB RAM, ECS K7S5A, AthlonXP 2000+); 400GB Seagate; 2x Hauppauge PVR-500; ATI Radeon 9000 (ATI driver 8.221.0.0); WinXP Home SP2; GB-PVR (1.0.16); DScaler MPEG decoder
PVR-1: A cast off HP Pavilion 750n (512MB RAM, 1.6GHz Pentium 4); 320GB Seagate; Hauppauge PVR-500; ATI Radeon 9550 (ATI driver 8.391.0.0); WinXP Home SP2; GB-PVR (1.0.16); DScaler MPEG decoder[/COLOR][/SIZE]
« Next Oldest | Next Newest »

Users browsing this thread: 1 Guest(s)



Possibly Related Threads…
Thread Author Replies Views Last Post
  IPTV Under Attack? Graham 0 1,189 2020-12-23, 12:01 PM
Last Post: Graham
  windows 7 unattended sleep and comskip jam_zhou 9 4,207 2014-08-28, 01:47 AM
Last Post: jam_zhou
  Clean way to sleep PC client Elmo Putney 5 2,557 2011-09-16, 07:53 PM
Last Post: stustunz
  BBC HD Encryption Graham 7 3,561 2009-11-21, 04:15 PM
Last Post: martint123
  Vista Sleep While running Task Manager Issue - Solved Satori 0 1,370 2009-06-12, 08:59 PM
Last Post: Satori
  Anyone use sleep/wake McBainUK 62 23,665 2008-10-23, 12:18 AM
Last Post: Jaggy
  No true "full screen" mode? flamenco 2 1,851 2006-04-29, 07:35 PM
Last Post: flamenco
  Toggle to full screen and window mode? 14hours 3 2,557 2006-03-31, 08:03 PM
Last Post: 14hours
  What XP Patch Stops The Sleep Mode On Fans? DoPeFiSh 16 4,706 2006-03-27, 07:04 AM
Last Post: ricklous
  Odd problem with Timeshift Mode and DISH Receiver 0 447 Less than 1 minute ago
Last Post:

  • View a Printable Version
  • Subscribe to this thread
Forum Jump:

© Designed by D&D, modified by NextPVR - Powered by MyBB

Linear Mode
Threaded Mode