Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory

Cold boot attacks are semi-invasive attacks which have threatened computer systems over a decade now to leak sensitive user information passwords, keys and PIN. With internet of things (IoT) finding mass deployment, their security must be well investigated. In this work, we take a look at popular Io...

Full description

Saved in:
Bibliographic Details
Main Authors: Won, Yoo-Seung, Bhasin, Shvam
Other Authors: 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)
Format: Conference or Workshop Item
Language:English
Published: 2022
Subjects:
Online Access:https://hdl.handle.net/10356/156099
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-156099
record_format dspace
spelling sg-ntu-dr.10356-1560992022-04-09T20:11:35Z Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory Won, Yoo-Seung Bhasin, Shvam 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC) Temasek Laboratories @ NTU Engineering::Computer science and engineering::Data::Data storage representations Random-Access Storage Cold Boot Attack Cold boot attacks are semi-invasive attacks which have threatened computer systems over a decade now to leak sensitive user information passwords, keys and PIN. With internet of things (IoT) finding mass deployment, their security must be well investigated. In this work, we take a look at popular IoT device Raspberry Pi (model B+), which is already deployed in millions. Raspberry Pi features a stacked memory on top of its processor, making it impossible to physically separate the RAM from the processor. We investigate the decay model of a cold boot attack on Raspberry Pi. The results show a decay rate as low as 0.00027\% which is orders of magnitude lower than previous works allowing close to perfect data recovery. We further report successful recovery of secret disk encryption key when using dm-crypt on Raspberry Pi followed by discussion on mitigation strategies. National Research Foundation (NRF) Submitted/Accepted version This research is supported in parts by the National Research Foundation, Singapore, under its National Cybersecurity Research & Development Programme / Cyber-Hardware Forensic & Assurance Evaluation R&D Programme (Award: NRF2018NCR-NCR009-0001). 2022-04-07T05:45:12Z 2022-04-07T05:45:12Z 2021 Conference Paper Won, Y. & Bhasin, S. (2021). Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory. 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 56-60. https://dx.doi.org/10.1109/FDTC53659.2021.00017 978-1-6654-3673-1 https://hdl.handle.net/10356/156099 10.1109/FDTC53659.2021.00017 56 60 en NRF2018NCR-NCR009-0001 © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/FDTC53659.2021.00017. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering::Data::Data storage representations
Random-Access Storage
Cold Boot Attack
spellingShingle Engineering::Computer science and engineering::Data::Data storage representations
Random-Access Storage
Cold Boot Attack
Won, Yoo-Seung
Bhasin, Shvam
Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory
description Cold boot attacks are semi-invasive attacks which have threatened computer systems over a decade now to leak sensitive user information passwords, keys and PIN. With internet of things (IoT) finding mass deployment, their security must be well investigated. In this work, we take a look at popular IoT device Raspberry Pi (model B+), which is already deployed in millions. Raspberry Pi features a stacked memory on top of its processor, making it impossible to physically separate the RAM from the processor. We investigate the decay model of a cold boot attack on Raspberry Pi. The results show a decay rate as low as 0.00027\% which is orders of magnitude lower than previous works allowing close to perfect data recovery. We further report successful recovery of secret disk encryption key when using dm-crypt on Raspberry Pi followed by discussion on mitigation strategies.
author2 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)
author_facet 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)
Won, Yoo-Seung
Bhasin, Shvam
format Conference or Workshop Item
author Won, Yoo-Seung
Bhasin, Shvam
author_sort Won, Yoo-Seung
title Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory
title_short Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory
title_full Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory
title_fullStr Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory
title_full_unstemmed Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory
title_sort are cold boot attacks still feasible : a case study on raspberry pi with stacked memory
publishDate 2022
url https://hdl.handle.net/10356/156099
_version_ 1731235718655639552