The following text is
copyright 2008 by Network World, permission is hearby given for reproduction,
as long as attribution is given and this notice is included.
Cold bits as a security
bypass
By: Scott Bradner
The headline in the New York Times was certainly designed to
catch a security person's eye -- "Researchers Find Way to Steal Encrypted
Data." But, in most cases the
risk, while real, is less than the headline implies.
It turns out that some researchers at Princeton University
followed up on earlier research that showed that modern computer memories
retained their contents even with the power off (known as memory remanence) and
that the retention time could be lengthen by cooling the memory. (See p 282 Anderson: "Security Engineering"
http://www.cl.cam.ac.uk/~rja14/Papers/SE-14.pdf) (This information almost makes me want to reminisce about core memory. http://en.wikipedia.org/wiki/Core_memory) The researchers then set about seeing if they
could use various techniques, including ones related to memory remanence
to extract encryption keys that had been stored in the memory of a computer
that was using disk encryption.
They found they could, in many cases, find the key and thus break the
security of the encrypted disk.
The Princeton researchers describe their attack in their
paper: "Lest We Remember: Cold Boot Attacks on Encryption Keys" (http://citp.princeton.edu.nyud.net/pub/coldboot.pdf)
and describe it in a video on their web site, (http://citp.princeton.edu/memory/
) including cooling the memory chips using a can of duster.
The risk of the particular attack can be largely mitigated
if the user has an idea when their computer might be attacked. For example, if you are entering the US
and are worried about US Customs wanting to peer into your machine. (http://www.schneier.com/blog/archives/2008/02/us_customs_seiz.html) In this case, and in other cases where
you are worried that a laptop could be stolen you can be well protected if you
do not have the machine set to autologin and you turn the machine fully off
(not just put in sleep mode) when you are told to shut down your electronic
devices in preparation for landing. You would be even better off using the hidden
volume mode in True Crypt (http://www.truecrypt.org/) so that you could boot
the machine for the nice Customs person and they would not even know you had
encrypted information on your machine so would not badger you for your
key.
(http://www.lawtechjournal.com/articles/2004/02_040413_clemens.pdf)
The paper also includes a number of ways that computer
manufactures and operating system vendors can reduce or eliminate the
disclosure risk. I use File Vault
on my Mac and I hope that Apple will tweak their software to maximize the
protection. Not because, I hasten
to add, that I have any illegal information on my laptop, but because I have
information that some of my clients would not like to see in the press.
It is harder to protect against someone grabbing a computer
from your desk when your back is turned, enabling a password protected screen
saver that kicks in when the cover is closed helps, but the thief, could just
not close the cover. Note that no fancy effort is needed in this case since the
thief already has access to your unencrypted disks through the regular user
interface.
One place where the Princeton process can clearly be used is
where the thief steals a computer with a locking wakeup screen which is using disk encryption and that
the user put into sleep mode. The thief will not be able to login to
the machine because of the wakeup screen.
But the machine has power so the memory is not fading. Cooling the memory would then allow the
thief to swap the memory to another computer for reading. So don't leave your laptop lying
around on the front seat of your car in sleep mode with state secrets on it.
disclaimer: I'm
not sure how you could tell if some parts of Harvard were in sleep mode but, in
any case, the above discussion is mine not the university's.