首页> 外文会议>European Symposium on Research in Computer Security >Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore
【24h】

Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore

机译:闯入密钥库:对抗Android KeyStore的实际伪造攻击

获取原文

摘要

We analyze the security of Android KeyStore, a system service whose purpose is to shield users credentials and cryptographic keys. The KeyStore protects the integrity and the confidentiality of keys by using a particular encryption scheme. Our main results are twofold. First, we formally prove that the used encryption scheme does not provide integrity, which means that an attacker is able to undetectably modify the stored keys. Second, we exploit this flaw to define a forgery attack breaching the security guaranteed by the KeyStore. In particular, our attack allows a malicious application to make mobile apps to unwittingly perform secure protocols using weak keys. The threat is concrete: the attacker goes undetected while compromising the security of users. Our findings highlight an important fact: intuition often goes wrong when security is concerned. Unfortunately, system designers still tend to choose cryptographic schemes not for their proved security but for their apparent simplicity. We show, once again, that this is not a good choice, since it usually results in severe consequences for the whole underlying system.
机译:我们分析了Android KeyStore的安全性,该系统服务,其目的是屏蔽用户凭据和加密密钥。密钥库通过使用特定的加密方案来保护键的完整性和机密性。我们的主要结果是双重的。首先,我们正式证明使用的加密方案不提供完整性,这意味着攻击者能够无法检测地修改存储的密钥。其次,我们利用此缺陷定义伪造攻击违反密钥库保证的安全性。特别是,我们的攻击允许恶意应用程序使移动应用程序不知不觉地使用弱密钥执行安全协议。威胁是具体的:攻击者未被发现,同时损害了用户的安全性。我们的研究结果突出了一个重要事实:当安全关注时,直觉经常出错。不幸的是,系统设计人员仍然倾向于选择不熟悉的安全性的加密计划,而是为了他们的表观简单。我们再次展示这不是一个不错的选择,因为它通常会导致整个底层系统的严重后果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号