首页> 外文会议>International Conference on Risks and Security of Internet and Systems >Key Extraction Attack Using Statistical Analysis of Memory Dump Data
【24h】

Key Extraction Attack Using Statistical Analysis of Memory Dump Data

机译:使用内存转储数据的统计分析进行密钥提取攻击

获取原文

摘要

During the execution of a program the keys for encryption algorithms are in the random access memory (RAM) of the machine. Technically, it is easy to extract the keys from a dumped image of the memory. However, not many examples of such key extractions exist, especially during program execution. In this paper, we present a key extraction technique and confirm its effectiveness by implementing the Process Peeping Tool (PPT) - an analysis tool - that can dump the memory during the execution of a target program and help the attacker deduce the encryption keys through statistical analysis of the memory contents. Utilising this tool, we evaluate the security of two sample programs, which are built on top of the well-known OpenSSL library. Our experiments show that we can extract both the private key of the RSA asymmetric cipher as well as the secret key of the AES block cipher.
机译:在执行程序期间,用于加密算法的密钥位于计算机的随机存取存储器(RAM)中。从技术上讲,很容易从转储的内存映像中提取密钥。但是,这种密钥提取的例子并不多,特别是在程序执行过程中。在本文中,我们提出了一种密钥提取技术,并通过实施过程偷窥工具(PPT)(一种分析工具)来确认其有效性,该工具可以在执行目标程序的过程中转储内存,并帮助攻击者通过统计推断出加密密钥。分析内存内容。利用此工具,我们评估了两个示例程序的安全性,它们是在众所周知的OpenSSL库的基础上构建的。我们的实验表明,我们既可以提取RSA非对称密码的私钥,也可以提取AES分组密码的私钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号