조회 수 131 추천 수 0 댓글 0
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄
Full-disk security isn't quite dead

At least monthly, it looks some vendor or techie promises to have broken a variation of a hard drive full-disk encryption (FDE) program scheme, while it's from Microsoft (my full-time company), BitLocker, open source favorite TrueCrypt, or some other variant. All of the storylines and also the ballyhoo are sufficient to make one ponder if FDE is dead.

The brief -- and marginally qualified -- reply is no. Should you have any kind of questions relating to where by and also the best way to work with Free VPN Provider, you possibly can e-mail us at our web-site. There really are a few of intelligent attacks, as well as applications to produce them simpler to display. Luckily there are simple methods to stop most of them. We are going to start, however, with the assault that does not have an simple shield.

[ A harmful Fb advertisement is redirecting users to fake anti-virus software. | Learn the best way to secure your systems with Roger Grimes' Security Advisor website and Security Central newsletter, both from InfoWorld. ]

Exploitation via FireWire

Fecund crypto- and password-cracking seller Passware lately pronounced that it could decode both BitLocker- and TrueCrypt-protected disc volumes utilizing the FireWire procedure. Theoretically, you can carry off related attacks with a DMA-enabled port, including PCI. These attacks may finally achieve success against any software crypto merchandise that will not utilize specialized hardware.

The protection I discussed earlier against cold-boot attacks may be used to defeat FireWire assaults. You may also conquer them by just disabling your FireWire port until needed. I inquired Sumin whether any of Passware's FDE-deciphering products can split right into a non-powered-on pc or whether the 1394 port was disabled. He explained, "No. We've got a brute force assault, but the encryption is quite protected when you have a good-enough password."

Sadly, in case you have PCI, PCMCIA, or connected card slots, somebody may slip in a FireWire adapter card, and it'll function in addition to an enabled FireWire port. I have noticed this strike manner demo, and I was amazed. Turning off all DMA-enabled ports is more challenging to do and may likely significantly change performance (and maybe OS stability), so I'm not certain I advocate it. Nonetheless, you can find protection of a wide range of port-memory strikes and mitigations across multiple programs. Should you-can't keep your powered-on computers physically secure when not being used, keep them run away or in hibernation setting.

Dmitry Sumin, president of Passware, confirmed the the headlines: "I think we can [crack] any of the favorite [software FDE merchandises]. It is a question of moment and creating the crucial-finding criteria."

The FireWire interface can often be enabled or disabled via a computer's BIOS settings or in Device Manager within Microsoft Windows. Most Linux and Unix flavours allow the FireWire port to be handicapped utilizing a boot up control swap, a re-compiled kernel, or a command-line instruction -- although the final option usually will not endure reboots. Most Mac help blogs propose unloading the AppleFWOHCI.kext kernel extension.

One solution to avoid storage assaults isn't to save the decryption key in ordinary memory. The Trusted Platform Module (TPM) chip in the Trustworthy Computing Group is an effort to provide greater safety to crypto secrets utilizing specific equipment. Most business-class computers now come with a TPM chip, and many crypto vendors can benefit from it, including Ms with BitLocker.

Cold-boot attack

In Feb 2008, a-team including Princeton's Dr. Edward Felton -- among the planet premier computer-security investigators -- used an interesting inherent house of pc storage to effectively hack BitLocker [PDF]. It turns out that pc memory chips may hold their contents from a couple of seconds to a few minutes following the computer's power is switched off. Further, decreasing the heat or freezing the processors empowers the items to remain in-play much longer -- enough period to be utilized in yet another specific investigation pc so the information could be copied to permanent storage. The strike team can then search for the primary BitLocker encryption key and unlock the information.

Browser Security Deeply Dive

The "cold boot" assault could very well be the most demanding assault to prevent on a computer without specialized crypto-hardware. The fault lies more with computer storage as opposed to concerned crypto. All applications-based crypto has to ultimately place the decryption key in regular memory in an unprotected state to ensure that it may be used to decrypt the hard disk drive. An opponent always has the choice to discover the unprotected important when he or she has a duplicate of memory to analyze.

This plan requires the opponent to somehow acquire the victim's pc while it's powering-down, just after it's powered down, or when it's coming back up from a suspended or standby condition. Subsequently the assailant has to freeze the processors, transfer them to another specialized computer, and use specially-built applications to get the key for the FDE cipher. If you're worried about this strike, ensure your alone, powered-on computers have good physical security; instead, consider using components crypto solutions that are resistant to cold-boot attacks.

Adjusting cool memory chips is not for the faint at-heart. Within the last two years, other researchers realized they could shoot storage on powered-up computers through the use of the 1394 FireWire interface available on many higher-end notebooks. Here's one discussion describing how exactly to decode BitLocker using the FireWire memory assault [PDF].

More Info it is possible to study:

List of Articles
번호 제목 글쓴이 날짜 조회 수
63235 my site Jeśli mają one służyć jedynie alicjakalmar 2022.01.15 132
63234 Гидра сайт купить esujifu 2022.01.16 132
63233 현재 직장인 블라인드에서 화제인 글.jpg 배털아찌 2022.02.24 132
63232 The Fine Art Of Digital Photography Jillian3956203060906 2015.10.03 131
63231 If you loved this pos... KelvinFavela03891192 2015.10.03 131
63230 If chamberlain gara... AshlyHeaney51821074 2015.10.03 131
63229 Dog Bite Law - Six Things To Do After Your Canine Bites Someone EFQAlexander1313 2015.10.03 131
63228 ประตูม้วน RoseannaDelvalle93 2015.10.03 131
63227 เครื่องพิมพ์ภาพบนวัสดุ ChassidyLangton9074 2015.10.03 131
63226 รับถ่ายวีดีโอแต่งงาน MyronPya04302307 2015.10.03 131
63225 Illinois Ticket End AndreaHardey871 2015.10.04 131
63224 ‘Clash Of Clans' Hack ErnestineUssery 2015.10.04 131
63223 ถ่ายวีดีโองานแต่ง MaricelaDhakiyarr2 2015.10.04 131
63222 5 Best Places For Holiday Rentals In Rome, Italy DeneenHake42157 2015.10.05 131
» Full-Disk Encryption Is Not Quite Dead LurleneVandegrift2 2015.10.05 131
63220 Facts Of Japan Lindsey08A4825578467 2015.10.15 131
63219 ทีมงานข่าวบาเซโลน่ารายงานว่า Sboไทย เว็บพนันบอลที่มั่นคงที่สุดบริการรวดเร็วมีข่าวสารอับเดทตลอดและข่าวที่ว่า ZAEJai192842453627534 2015.10.16 131
63218 Mariota Released Ticket For Operating 80 Mph VioletBadillo365508 2015.10.16 131
63217 Порно Бесплатно Случайный Секс Русское. HenryPelletier1 2015.10.16 131
63216 Секс В Реале Смотреть Бесплатно. DelorisBolt0471 2015.10.17 131
Board Pagination Prev 1 ... 59 60 61 62 63 64 65 66 67 68 ... 3225 Next
/ 3225
XE1.7.11 Layout1.1.0