Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory
Cold boot attacks are semi-invasive attacks which have threatened computer systems over a decade now to leak sensitive user information passwords, keys and PIN. With internet of things (IoT) finding mass deployment, their security must be well investigated. In this work, we take a look at popular Io...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/156099 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-156099 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1560992022-04-09T20:11:35Z Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory Won, Yoo-Seung Bhasin, Shvam 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC) Temasek Laboratories @ NTU Engineering::Computer science and engineering::Data::Data storage representations Random-Access Storage Cold Boot Attack Cold boot attacks are semi-invasive attacks which have threatened computer systems over a decade now to leak sensitive user information passwords, keys and PIN. With internet of things (IoT) finding mass deployment, their security must be well investigated. In this work, we take a look at popular IoT device Raspberry Pi (model B+), which is already deployed in millions. Raspberry Pi features a stacked memory on top of its processor, making it impossible to physically separate the RAM from the processor. We investigate the decay model of a cold boot attack on Raspberry Pi. The results show a decay rate as low as 0.00027\% which is orders of magnitude lower than previous works allowing close to perfect data recovery. We further report successful recovery of secret disk encryption key when using dm-crypt on Raspberry Pi followed by discussion on mitigation strategies. National Research Foundation (NRF) Submitted/Accepted version This research is supported in parts by the National Research Foundation, Singapore, under its National Cybersecurity Research & Development Programme / Cyber-Hardware Forensic & Assurance Evaluation R&D Programme (Award: NRF2018NCR-NCR009-0001). 2022-04-07T05:45:12Z 2022-04-07T05:45:12Z 2021 Conference Paper Won, Y. & Bhasin, S. (2021). Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory. 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 56-60. https://dx.doi.org/10.1109/FDTC53659.2021.00017 978-1-6654-3673-1 https://hdl.handle.net/10356/156099 10.1109/FDTC53659.2021.00017 56 60 en NRF2018NCR-NCR009-0001 © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/FDTC53659.2021.00017. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering::Data::Data storage representations Random-Access Storage Cold Boot Attack |
spellingShingle |
Engineering::Computer science and engineering::Data::Data storage representations Random-Access Storage Cold Boot Attack Won, Yoo-Seung Bhasin, Shvam Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory |
description |
Cold boot attacks are semi-invasive attacks which have threatened computer systems over a decade now to leak sensitive user information passwords, keys and PIN. With internet of things (IoT) finding mass deployment, their security must be well investigated. In this work, we take a look at popular IoT device Raspberry Pi (model B+), which is already deployed in millions. Raspberry Pi features a stacked memory on top of its processor, making it impossible to physically separate the RAM from the processor. We investigate the decay model of a cold boot attack on Raspberry Pi. The results show a decay rate as low as 0.00027\% which is orders of magnitude lower than previous works allowing close to perfect data recovery. We further report successful recovery of secret disk encryption key when using dm-crypt on Raspberry Pi followed by discussion on mitigation strategies. |
author2 |
2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC) |
author_facet |
2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC) Won, Yoo-Seung Bhasin, Shvam |
format |
Conference or Workshop Item |
author |
Won, Yoo-Seung Bhasin, Shvam |
author_sort |
Won, Yoo-Seung |
title |
Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory |
title_short |
Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory |
title_full |
Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory |
title_fullStr |
Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory |
title_full_unstemmed |
Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory |
title_sort |
are cold boot attacks still feasible : a case study on raspberry pi with stacked memory |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/156099 |
_version_ |
1731235718655639552 |