Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please respond with your discussion post of at least 300 words C In section 3 of

ID: 3800530 • Letter: P

Question

Please respond with your discussion post of at least 300 words

C In section 3 of The Journa A Systematic Assessmer X ncrypting Volun bcswebdav/pid-20768270-dt-content-rid-52703248 1/aourses/2171-1 18IT2030C004/2171-1 18IT2030C004 ImportedContent 2017 temperatures slow down the fading process uch that by cooling down RAM chips, the remanence interval can be 3 SOFTWARE-BASED FDE SECURITY extended from 30 seconds up to ten minutes. Anderson and Kuhn first outlined attacks that exploit the remanence effect We now give a comprehensive overview of all known attacks on software-based FDE. These attacks serve as inspi of cooled down RAM chips [211. In applied cryptography ration to new attacks on hardware-based FDE explained in the remanence effect can also be used as a time source [221 and as an entropy source 123l. With respect to disk encryp- Section 4. Overall, we identified three types of physical access attacks against software-based FDE, that we present tion, another way to access in main memory is to in chronological order replug cooled down RAM chips physically into another PC. This variant is more generic than the reboot variant, because it works irrespectively of BIOS and boot sequence settings. 3.1 DMA-Based Attacks Cold boot attacks pose a generic threat to all software- In 2005, direct memory access attacks were pioneered by based FDE technologies, including dm-crypt, BitLocker Dornseifet al. 111. Their work was the begi nning of a series of and TrueCrypt. Similar to DMA-based attacks, the target attacks that exploit DMA interfaces like FireWire. In princi of a cold boot attack must be running or in standby mode ple, all DMA-capable ports exhibit the same vulnerability including ExpressCard 1101, [11l, PCI Express (PCIe) 112, In academia, so-called CPu-bound encryption systems like and, as shown in 2012, Thunderbolt [13l. In the original AESSE 124l, TRESOR [16l, LoopAmnesia 125l and attack, an Apple Macintosh was compromised via direct ARMORED 126l re known to protect against cold boot memory access from a malicious iPod. However, in the origi attacks. CPU-bound encryption systems never store keys in RAM but only inside CPU registers over the entire nal attack, disk encryption was not considered explicitly uptime of a system. The protection of CPU-bound encryp One possibility to deploy DMA attacks against disk encryp tion, however, is limited to classic cold boot scenarios tion is to target the key of software-based FDE in main mem Other attacks, such as DMA and JTAG access on running ory. Using DMA, main memory can be scanned for possibl machines, cannot be defeated by CPU-bound encryption keys and these keys can later be used to decrypt the disk. as shown by Blass and Robertson [171 Another attack stems from the fact that DMA allows to write into RAM and to manipulate the system space. This can be exploited to unlock an Os lock screen, as proven by attacks 3-3 Evil Maid Attacks The term "evil maid" was coined by Rutkowska 13l and is against Windows Vista [14] and Windows 7I15l DMA-based attacks succeed if the target PC is running based on the following scenario: Let the victim be a trave (SC S2) or in standby mode (S3). If the target is switched off, ing salesman who leaves his encrypted laptop in a hotel

Explanation / Answer

Attacks against software based FDE

                                                                 There are three predominant attacks are exists against software based FDE, namely

Let see those predominant attacks little briefly.

DMA attack :

                                   It is an type of side channel attack in the computer securiity, where the attackers will penetrate the system or connected device, with the help of high speed transmitting ports, which give access to DMA.

Since it lets the connected device, DMA is connected in many connection, it allows the transfer of data between itself and the computer at very high speed.

The ways to prevent the DMA attacks is to avoid physical connection to such ports will avoid DMA attacks. Also in many computers, the connection which allows DMA connection are disabled for security purpose.

Example ports that allows DMA connections are Express card, Fire wire, Thunderbolt, PCI.

Cold Boot Attack:

                                    It is an process of retrieving un authorized access to computer encrypted keys, when the computer is idle. It mainly happens because DRAM chips retains the data for certain period of time, even after computer got turned off.

The amount of time the data remains in the chip set can be easily increased by removing the chip from mother board and cooling it using, compressed air.With this the attacker will gain full access to the encrypted keys, whichh allows the user decrypt easily.

To avoid this attack the chip set are need to be embeded with mother board or to be glued, which make it impossible to remove the chip slot.

Evil Maid Attacks:

It is an kind of security exploit which mainly concentrated on computing devices that got shut down and left unattended, It mainly depends on the ability of the attackers to access the computing machine, without owners knowledge.

The purpose of the attack is to steal and sell the key, else it will change, else it will change computing device software rights.

Most likely threat

                       Of the above three threats, the most likely threats was the Direct memory access threat, since both the evil maid attack and cold boot attack need the access to the system physically with the owners knowledge for long period of time. With modern world of security it is easy to make the system physically safe without much hassle.

Yes it is definitely different for College users and business users, since the industrial data are more complex and important the data availabe in campus system, since the security feature will be more secured for business users.

Also the systems used by the Goverment and military ultimately high level of security, whichh will invest most of time and money in safe guarding for all the attacks since the information are highly important.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote