Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory
Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present new problems for forensic investigators, as clues to their investigation may...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk
2008
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8895 |
id |
ndltd-UPSALLA1-oai-DiVA.org-ntnu-8895 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-ntnu-88952013-01-08T13:26:27ZForensic Key Discovery and Identification : Finding Cryptographic Keys in Physical MemoryengMaartmann-Moe, CarstenNorges teknisk-naturvitenskapelige universitet, Institutt for telematikkInstitutt for telematikk2008ntnudaimSIE7 kommunikasjonsteknologiTelematikkCommunication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present new problems for forensic investigators, as clues to their investigation may be undecipherable. However, contrary to popular belief, these systems are not impenetrable. Forensic memory dumping and analysis can pose as ways to recover cryptographic keys that are present in memory due to bad coding practice, operation system quirks or hardware hacks. The volatile nature of physical memory does however challenge the classical principles of digital forensics as its transitory state may disappear at the flick of a switch. In this thesis, we analyze existing and present new cryptographic key search algorithms, together with different confiscation and analysis methods for images of volatile memory. We provide a new proof of concept tool that can analyze memory images and recover cryptographic keys, and use this tool together with a virtualized testbed to simulate and examine the different states of platforms with several separate cryptosystems. Making use of this testbed, we provide experiments to point out how modern day encryption in general are vulnerable to memory disclosure attacks. We show that memory management procedures, coding practice and the overall state of the system has great impact on the amount and quality of data that can be extracted, and present simple statistics of our findings. The discoveries have significant implications for most software encryption vendors and the businesses relying on these for data security. Using our results, we suggest best practices that can help investigators build a more comprehensive data foundation for analysis, by reconstructing virtual memory from RAM images. We also discuss how investigators may reduce the haystack by leveraging memory and process structure on Windows computers. Finally we tie this to current digital forensic procedures, and suggest an optimized way of handling live analysis based on the latest development in the field. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8895Local ntnudaim:4099application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
ntnudaim SIE7 kommunikasjonsteknologi Telematikk |
spellingShingle |
ntnudaim SIE7 kommunikasjonsteknologi Telematikk Maartmann-Moe, Carsten Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory |
description |
Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present new problems for forensic investigators, as clues to their investigation may be undecipherable. However, contrary to popular belief, these systems are not impenetrable. Forensic memory dumping and analysis can pose as ways to recover cryptographic keys that are present in memory due to bad coding practice, operation system quirks or hardware hacks. The volatile nature of physical memory does however challenge the classical principles of digital forensics as its transitory state may disappear at the flick of a switch. In this thesis, we analyze existing and present new cryptographic key search algorithms, together with different confiscation and analysis methods for images of volatile memory. We provide a new proof of concept tool that can analyze memory images and recover cryptographic keys, and use this tool together with a virtualized testbed to simulate and examine the different states of platforms with several separate cryptosystems. Making use of this testbed, we provide experiments to point out how modern day encryption in general are vulnerable to memory disclosure attacks. We show that memory management procedures, coding practice and the overall state of the system has great impact on the amount and quality of data that can be extracted, and present simple statistics of our findings. The discoveries have significant implications for most software encryption vendors and the businesses relying on these for data security. Using our results, we suggest best practices that can help investigators build a more comprehensive data foundation for analysis, by reconstructing virtual memory from RAM images. We also discuss how investigators may reduce the haystack by leveraging memory and process structure on Windows computers. Finally we tie this to current digital forensic procedures, and suggest an optimized way of handling live analysis based on the latest development in the field. |
author |
Maartmann-Moe, Carsten |
author_facet |
Maartmann-Moe, Carsten |
author_sort |
Maartmann-Moe, Carsten |
title |
Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory |
title_short |
Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory |
title_full |
Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory |
title_fullStr |
Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory |
title_full_unstemmed |
Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory |
title_sort |
forensic key discovery and identification : finding cryptographic keys in physical memory |
publisher |
Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk |
publishDate |
2008 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8895 |
work_keys_str_mv |
AT maartmannmoecarsten forensickeydiscoveryandidentificationfindingcryptographickeysinphysicalmemory |
_version_ |
1716520083750125568 |