2013 IEEE Symposium on Security and Privacy 2013
DOI: 10.1109/sp.2013.46
|View full text |Cite
|
Sign up to set email alerts
|

Welcome to the Entropics: Boot-Time Entropy in Embedded Devices

Abstract: We present three techniques for extracting entropy during boot on embedded devices. Our first technique times the execution of code blocks early in the Linux kernel boot process. It is simple to implement and has a negligible runtime overhead, but, on many of the devices we test, gathers hundreds of bits of entropy. Our second and third techniques, which run in the bootloader, use hardware features-DRAM decay behavior and PLL locking latency, respectively-and are therefore less portable and less generally appl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 26 publications
0
16
0
1
Order By: Relevance
“…Of course, one cannot hope to fully characterize software entropy sources in complex, modern systems, and instead we will use empirical estimates as also done by prior RNG analyses [9,23]. When estimating complexity of attacking an RNG, we will be conservative whenever possible (letting the adversary know more than realism would dictate).…”
Section: Measurement Study Overviewmentioning
confidence: 99%
See 4 more Smart Citations
“…Of course, one cannot hope to fully characterize software entropy sources in complex, modern systems, and instead we will use empirical estimates as also done by prior RNG analyses [9,23]. When estimating complexity of attacking an RNG, we will be conservative whenever possible (letting the adversary know more than realism would dictate).…”
Section: Measurement Study Overviewmentioning
confidence: 99%
“…We also include one special mechanism for quickly initializing (or refreshing) the entropy of Whirlwind, which is needed to prevent a boot-time entropy hole (like the ones in the legacy RNG, see Section IV) and to recover from a VM reset. For boot time, we would have liked to use the recent suggestion of Mowery et al [23] to quickly generate entropy in the initial stages of boot via timing of functions in the kernel init function. Unfortunately, this is not fast enough for us, since we observe reads to the RNG early in init.…”
Section: Algorithm 4 Ww Bootstrap()mentioning
confidence: 99%
See 3 more Smart Citations