2008 Third International Conference on Availability, Reliability and Security 2008
DOI: 10.1109/ares.2008.109
|View full text |Cite
|
Sign up to set email alerts
|

Recovery of Encryption Keys from Memory Using a Linear Scan

Abstract: As encrypted containers are encountered more frequently the need for live imaging is likely to increase. However, an acquired live image of an open encrypted file system cannot later be verified against any original evidence, since when the power is removed the decrypted contents are no longer accessible. This paper shows that if a memory image is also obtained at the same time as the live container image, by the design of on-the-fly encryption, decryption keys can be recovered from the memory dump. These keys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
25
1

Year Published

2008
2008
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 41 publications
(27 citation statements)
references
References 11 publications
1
25
1
Order By: Relevance
“…However, the potential problems of using live images from encrypted systems are highlighted in Hargreaves and Chivers (2008), since the accuracy of the acquired image cannot be verified by comparing to an original. Therefore, in addition to obtaining disk images from a live system, it is also possible to create backup copies of the start-up or recovery keys by accessing the 'Manage BitLocker Keys' interface through the Control Panel, as shown in Fig.…”
Section: Recovering Data From a Live Bitlocker Enabled Systemsmentioning
confidence: 99%
“…However, the potential problems of using live images from encrypted systems are highlighted in Hargreaves and Chivers (2008), since the accuracy of the acquired image cannot be verified by comparing to an original. Therefore, in addition to obtaining disk images from a live system, it is also possible to create backup copies of the start-up or recovery keys by accessing the 'Manage BitLocker Keys' interface through the Control Panel, as shown in Fig.…”
Section: Recovering Data From a Live Bitlocker Enabled Systemsmentioning
confidence: 99%
“…It is most commonly used during incident response to attempt a determination of how a machine was compromised. However, live forensics is likely to become more important and more common as users become familiar with and operating systems come standard with full disk encryption as it can be vital to circumventing such encryption (Casey & Stellatos, 2008;Hargreaves & Chivers, 2008).…”
Section: Live Forensics Phasementioning
confidence: 99%
“…In this case, we may achieve a low false alarm rate. In fact, the method of brute force memory scanning has been used in memory forensics [28]. It has to overcome the difficulties of large address space and unclear goals.…”
Section: Datamentioning
confidence: 99%
“…More specifically it first uses hardware card, virtualization, and applications at different levels including user level and kernel level. To acquire memory [15], Hargreaves and Chivers proposed a method for recovering the decryption keys from the memory using linear scan [28]. Sylve et al proposed a novel technique for locating kernel object allocations with quick pool tag scanning [17], which has a good performance in the large memory space.…”
Section: Memory Forensicsmentioning
confidence: 99%
See 1 more Smart Citation