Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems
Description
As lightweight embedded devices become increasingly ubiquitous and connected, they present a disturbing target for adversaries circumventing the gates of cryptography. We consider the challenge of exfiltrating and locating cryptographic keys from the run-time environment of software-based services when their software layout and data structures in memory are unknown. We detail an attack that can, without affecting the system’s operation, exfiltrate keys in use promptly by leveraging the strong causality between transceivers and keyed cryptosystems (authentication, authorization, and encryption). We then propose how to effectively and efficiently reduce the key material’s search space from a batch of stackshots (stack extractions) by leveraging the stack’s innate composition, which, to the best of our knowledge, is the first method to systematically infer and reduce the search space of semi-arbitrary keys. We instantiate and evaluate our attack against MSP430 micro-controllers.
Notes
Files
Segregating_Keys_from_noncense_Timely_Exfil_of_Ephemeral_Keys_from_Embedded_Systems.pdf
Files
(640.8 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:c4a1cff7c4e5f686ee9c6d200e83c557
|
640.8 kB | Preview Download |