2016
DOI: 10.1007/978-3-319-39555-5_3
|View full text |Cite
|
Sign up to set email alerts
|

Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token

Abstract: Hardware tokens for user authentication need a secure and usable mechanism to lock them when not in use. The Pico academic project proposes an authentication token unlocked by the proximity of simpler wearable devices that provide shares of the token's master key. This method, however, is vulnerable to a cold boot attack: an adversary who captures a running Pico could extract the master key from its RAM and steal all of the user's credentials. We present a cryptographic countermeasure-bivariate secret sharing-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…The work has generated many technical results (e.g. see Goldberg et al, Stajano et al and others [22], [23]), but only one user study has previously been conducted and published on nonfunctional Pico prototypes [20]. Some recent work by Urueña and Soto [24] has sought to empirically assess login times, but currently the work is in its early stages.…”
Section: Related Workmentioning
confidence: 99%
“…The work has generated many technical results (e.g. see Goldberg et al, Stajano et al and others [22], [23]), but only one user study has previously been conducted and published on nonfunctional Pico prototypes [20]. Some recent work by Urueña and Soto [24] has sought to empirically assess login times, but currently the work is in its early stages.…”
Section: Related Workmentioning
confidence: 99%