Defeating Disk Encryption

Martin Brinkmann
Feb 25, 2008
Updated • Nov 28, 2012
Encryption, Security
|
7

I discovered an interesting video at Hack a Day from the University of Princeton demonstrating how to break disk encryption using so called RAM Dumps. This basically takes into account that the encryption key is stored in RAM. While most disk encryption mechanisms are vulnerable while the computer is on or in sleep mode some are even vulnerable when powered off.

What the researchers did was to boot the computer from an USB drive that loads a RAM dumping program. Tests conducted by the University of Princeton showed that it took between seconds and minutes before data that was stored in RAM was completely erased. The RAM also vanished in a predictable manner.

It's interesting to see that cooling the RAM down to minus 50 degrees prolonged the time the data was readable, it was clearly readable after ten minutes. It's a very interesting video in my opinion.

If you never thought about using a BIOS password and disabling booting from USB devices and CD / DVD before you should start thinking about it right now. That is if you use disk encryption.

Physical access to the PC is obviously required for this method, and that requires some level of preparedness on behalf of the people who try to dump the RAM and extract the encryption key this way. There is no sure fire way to protect the system against this attack if the attackers are prepared. While you can add a BIOS password to the PC and block booting from USB drives or CD and DVDs, it is still possible to take the RAM out of the attacked PC to insert it into a portable reading station or even another PC or mobile device.

Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. jj said on August 5, 2008 at 7:55 am
    Reply

    I dont think its possible to do this on Drivecrypt before it loads into operating system anyway.

  2. Rarst said on July 20, 2008 at 4:06 pm
    Reply

    So don’t leave notebook turned on and unattended. Actually this was very good idea even before these possible attacks. :)

  3. Vivek said on July 20, 2008 at 2:44 pm
    Reply

    wow … that was clever !!! :)

    Probably the next step in encryption would be mapping RAM’s capacitors and deliberately storing the key at different locations and different RAM modules (most of us have dual channel RAMs now, isnt it). Is that even possible??

    Also, adding redundancy to confuse the hacker should be useful too!!

  4. Martin said on February 25, 2008 at 7:13 pm
    Reply

    Hehe you are right of course, but it’s better than nothing :)

  5. Wiegmann said on February 25, 2008 at 6:27 pm
    Reply

    “If you never thought about using a BIOS password and disabling booting from USB devices and CD / DVD before you should start thinking about it right now. That is if you use disk encryption.”

    <-That doesn’t really help you, if you put the RAM into another computer, like in the video mentionend! The BIOS settings aren’t stored in RAM :-)

  6. Jawwad said on February 25, 2008 at 5:21 pm
    Reply

    I wonder if they can defeat the TrueCrypt 5.0 encryption using this technique?

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.