This story appeared on Network World at

http://www.networkworld.com/columnists/2008/022608-bradner.html

 

Cold bits as a security bypass

 

Bypassing disk encryption with a spray can

 

'Net Insider By Scott Bradner , Network World , 02/26/2008

 

Network World's headline was certainly designed to catch a security person's eye: "Disk encryption easily cracked, researchers find." In most cases, however, the risk, while real, is less than the headline implies.

 

It turns out that some researchers at Princeton University followed up on earlier research showing that modern computer memories retained their contents even with the power off (known as memory remanence), and that the retention time could be lengthened by cooling the memory. (See the chapter on physical tamper resistance in Ross Anderson's Security Engineering: A Guide to Building Dependable Distributed Systems. This information almost makes me want to reminisce about core memory.)  The researchers then set about seeing whether they could use various techniques, including ones related to memory remanence, to extract encryption keys that had been stored in the memory of a computer that was using disk encryption. In many cases, they found they could find the key and thus break the security of the encrypted disk.

 

The Princeton researchers describe their attack in their paper "Lest We Remember: Cold Boot Attacks on Encryption Keys" and describe it in a video on their Web site, including cooling the memory chips using a spray can of duster.

 

The risk of the particular attack can be largely mitigated if the user has an idea about when his computer might be attacked,  For example, you are entering the United States and are worried about U.S. Customs wanting to peer into your machine. In this case -- and in other cases where you are worried that a laptop could be stolen -- you can be well protected if you do not have the machine set to auto-logon and you turn the machine fully off (not just into sleep mode) when you are told to shut down your electronic devices in preparation for landing. You would be even better off using the hidden volume mode in TrueCrypt so you could boot the machine for the nice Customs people and they would not even know you had encrypted information on your machine -- so they would not badger you for your key.

 

The paper also includes a number of ways that computer manufacturers and operating-system vendors can reduce or eliminate the disclosure risk. I use FileVault on my Mac, and I hope Apple will tweak its software to maximize the protection. Not because, I hasten to add, that I have any illegal information on my laptop, but because I have information that some of my clients would not like to see in the press.

 

It is harder to protect against someone grabbing a computer from your desk when your back is turned. It helps to enable a password-protected screen saver that kicks in when the cover is closed, but the thief could just not close the cover. Note that no fancy effort is needed in this case because the thief already has access to your unencrypted disks through the regular user interface.

 

One place where the Princeton process clearly can be used is where the thief steals a computer with a locking wake-up screen that uses disk encryption and that the user has put into sleep mode. The thief will not be able to log on to the machine because of the wake-up screen. The machine has power, however, so the memory is not fading. Cooling the memory would allow the thief to swap the memory to another computer for reading. So, don't leave your laptop lying around on the front seat of your car in sleep mode with state secrets on it.

 

Disclaimer: I'm not sure how you could tell if some parts of Harvard University were in sleep mode, but in any case, the above discussion is mine, not the university's.

 

All contents copyright 1995-2008 Network World, Inc.http://www.networkworld.com