Planned maintenance
A system upgrade is planned for 10/12-2024, at 12:00-13:00. During this time DiVA will be unavailable.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Key-hiding on the ARM platform
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
2014 (English)In: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 11, no Supplement 1, p. S63-S67Article in journal (Refereed) Published
Abstract [en]

To combat the problem of encryption key recovery from main memory using cold boot-attacks, various solutions has been suggested, but most of these have been implemented on the x86 architecture, which is not prevalent in the smartphone market, where instead ARM dominates. One existing solution does exist for the ARM architecture but it is limited to key sizes of 128 bits due to not being able to utilise the full width of the CPU registers used for key storage. We developed a test-implementation of CPU-bound key storage with 256-bit capacity, without using more hardware resources than the previous solution. We also show that access to the key can be restricted for programs executing outside the kernel space.

Place, publisher, year, edition, pages
Elsevier , 2014. Vol. 11, no Supplement 1, p. S63-S67
Keywords [en]
cold-boot, cryptography, computer architechture, ARM
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-6664DOI: 10.1016/j.diin.2014.03.008ISI: 000335438900008Local ID: oai:bth.se:forskinfoEAA76B6DFD8A9D1EC1257CDA003124ACOAI: oai:DiVA.org:bth-6664DiVA, id: diva2:834188
Note

Special issue of the journal Digital Investigation (The proceedings of the first annual DFRWS Europe conference)

Available from: 2014-07-17 Created: 2014-05-16 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

fulltext(269 kB)393 downloads
File information
File name FULLTEXT01.pdfFile size 269 kBChecksum SHA-512
64f4ed5942f17f7d3b6c9cdf9805ab9ff80849d6af191e9221d245e3280c5291a545c35c8fb12b666a8e582db11875d5eed9595e0b1be5a94c59c32944bac75c
Type fulltextMimetype application/pdf

Other links

Publisher's full text

Authority records

Nilsson, AlexanderAndersson, MarcusAxelsson, Stefan

Search in DiVA

By author/editor
Nilsson, AlexanderAndersson, MarcusAxelsson, Stefan
By organisation
Department of Computer Science and Engineering
In the same journal
Digital Investigation. The International Journal of Digital Forensics and Incident Response
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 393 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 194 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf