Published June 28, 2021 | Version v1
Conference paper Open

Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems

  • 1. Technical University of Denmark
  • 2. Ubitech Ltd., Digital Security & Trusted Computing Group

Description

As lightweight embedded devices become increasingly ubiquitous and connected, they present a disturbing target for adversaries circumventing the gates of cryptography. We consider the challenge of exfiltrating and locating cryptographic keys from the run-time environment of software-based services when their software layout and data structures in memory are unknown. We detail an attack that can, without affecting the system’s operation, exfiltrate keys in use promptly by leveraging the strong causality between transceivers and keyed cryptosystems (authentication, authorization, and encryption). We then propose how to effectively and efficiently reduce the key material’s search space from a batch of stackshots (stack extractions) by leveraging the stack’s innate composition, which, to the best of our knowledge, is the first method to systematically infer and reduce the search space of semi-arbitrary keys. We instantiate and evaluate our attack against MSP430 micro-controllers.

Files

Segregating_Keys_from_noncense__Timely_Exfil_of_Ephemeral_Keys_from_Embedded_Systems.pdf

Additional details

Funding

European Commission
ASSURED - Future Proofing of ICT Trust Chains: Sustainable Operational Assurance and Verification Remote Guards for Systems-of-Systems Security and Privacy 952697