Published November 17, 2021 | Version v1
Conference paper Open

Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems

  • 1. Technical University of Denmark (DTU)

Description

As lightweight embedded devices become increasingly ubiquitous and connected, they present a disturbing target for adversaries circumventing the gates of cryptography. We consider the challenge of exfiltrating and locating cryptographic keys from the run-time environment of software-based services when their software layout and data structures in memory are unknown. We detail an attack that can, without affecting the system’s operation, exfiltrate keys in use promptly by leveraging the strong causality between transceivers and keyed cryptosystems (authentication, authorization, and encryption). We then propose how to effectively and efficiently reduce the key material’s search space from a batch of stackshots (stack extractions) by leveraging the stack’s innate composition, which, to the best of our knowledge, is the first method to systematically infer and reduce the search space of semi-arbitrary keys. We instantiate and evaluate our attack against MSP430 micro-controllers.

Notes

https://ieeexplore.ieee.org/abstract/document/9599891/

Files

Segregating_Keys_from_noncense_Timely_Exfil_of_Ephemeral_Keys_from_Embedded_Systems.pdf

Additional details

Funding

European Commission
ASSURED - Future Proofing of ICT Trust Chains: Sustainable Operational Assurance and Verification Remote Guards for Systems-of-Systems Security and Privacy 952697