Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory

Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present new problems for forensic investigators, as clues to their investigation may...

Full description

Bibliographic Details
Main Author: Maartmann-Moe, Carsten
Format: Others
Language:English
Published: Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk 2008
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8895
id ndltd-UPSALLA1-oai-DiVA.org-ntnu-8895
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-ntnu-88952013-01-08T13:26:27ZForensic Key Discovery and Identification : Finding Cryptographic Keys in Physical MemoryengMaartmann-Moe, CarstenNorges teknisk-naturvitenskapelige universitet, Institutt for telematikkInstitutt for telematikk2008ntnudaimSIE7 kommunikasjonsteknologiTelematikkCommunication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present new problems for forensic investigators, as clues to their investigation may be undecipherable. However, contrary to popular belief, these systems are not impenetrable. Forensic memory dumping and analysis can pose as ways to recover cryptographic keys that are present in memory due to bad coding practice, operation system quirks or hardware hacks. The volatile nature of physical memory does however challenge the classical principles of digital forensics as its transitory state may disappear at the flick of a switch. In this thesis, we analyze existing and present new cryptographic key search algorithms, together with different confiscation and analysis methods for images of volatile memory. We provide a new proof of concept tool that can analyze memory images and recover cryptographic keys, and use this tool together with a virtualized testbed to simulate and examine the different states of platforms with several separate cryptosystems. Making use of this testbed, we provide experiments to point out how modern day encryption in general are vulnerable to memory disclosure attacks. We show that memory management procedures, coding practice and the overall state of the system has great impact on the amount and quality of data that can be extracted, and present simple statistics of our findings. The discoveries have significant implications for most software encryption vendors and the businesses relying on these for data security. Using our results, we suggest best practices that can help investigators build a more comprehensive data foundation for analysis, by reconstructing virtual memory from RAM images. We also discuss how investigators may reduce the haystack by leveraging memory and process structure on Windows computers. Finally we tie this to current digital forensic procedures, and suggest an optimized way of handling live analysis based on the latest development in the field. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8895Local ntnudaim:4099application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic ntnudaim
SIE7 kommunikasjonsteknologi
Telematikk
spellingShingle ntnudaim
SIE7 kommunikasjonsteknologi
Telematikk
Maartmann-Moe, Carsten
Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory
description Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present new problems for forensic investigators, as clues to their investigation may be undecipherable. However, contrary to popular belief, these systems are not impenetrable. Forensic memory dumping and analysis can pose as ways to recover cryptographic keys that are present in memory due to bad coding practice, operation system quirks or hardware hacks. The volatile nature of physical memory does however challenge the classical principles of digital forensics as its transitory state may disappear at the flick of a switch. In this thesis, we analyze existing and present new cryptographic key search algorithms, together with different confiscation and analysis methods for images of volatile memory. We provide a new proof of concept tool that can analyze memory images and recover cryptographic keys, and use this tool together with a virtualized testbed to simulate and examine the different states of platforms with several separate cryptosystems. Making use of this testbed, we provide experiments to point out how modern day encryption in general are vulnerable to memory disclosure attacks. We show that memory management procedures, coding practice and the overall state of the system has great impact on the amount and quality of data that can be extracted, and present simple statistics of our findings. The discoveries have significant implications for most software encryption vendors and the businesses relying on these for data security. Using our results, we suggest best practices that can help investigators build a more comprehensive data foundation for analysis, by reconstructing virtual memory from RAM images. We also discuss how investigators may reduce the haystack by leveraging memory and process structure on Windows computers. Finally we tie this to current digital forensic procedures, and suggest an optimized way of handling live analysis based on the latest development in the field.
author Maartmann-Moe, Carsten
author_facet Maartmann-Moe, Carsten
author_sort Maartmann-Moe, Carsten
title Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory
title_short Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory
title_full Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory
title_fullStr Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory
title_full_unstemmed Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory
title_sort forensic key discovery and identification : finding cryptographic keys in physical memory
publisher Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk
publishDate 2008
url http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8895
work_keys_str_mv AT maartmannmoecarsten forensickeydiscoveryandidentificationfindingcryptographickeysinphysicalmemory
_version_ 1716520083750125568