Götzfried J, Müller T (2014)
Publication Type: Journal article, Original article
Publication year: 2014
Publisher: JoWUA
Edited Volumes: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
City/Town: Korea
Book Volume: 5
Pages Range: 84-100
Edition: 1
Since Android 4.0, which was released in October 2011, users of Android smartphones are provided with a built-in encryption feature to protect their home partitions. In the work at hand, we give a structured analysis of this software-based encryption solution. For example, software-based encryption always requires at least a small part of the disk to remain unencrypted; in Android this is the entire system partition. Unencrypted parts of a disk can be read out and are open to system manipulations. We present a tool named EvilDroid to show that with physical access to an encrypted smartphone only (i.e., without user level privileges), the Android system partition can be subverted with keylogging. Additionally, as it was exemplary shown by attacks against Galaxy Nexus devices in 2012, Android-driven ARM devices are vulnerable to cold boot attacks. Data recovery tools like FROST exploit the remanence effect of RAM to recover data from encrypted smartphones, at worst the disk encryption key. With a Linux kernel module named Armored, we demonstrate that Android's software encryption can be improved to withstand cold boot attacks by performing AES entirely on the CPU without RAM. As a consequence, cold boot attacks on encryption keys can be defeated. We present both a detailed security and a performance analysis of Armored.
APA:
Götzfried, J., & Müller, T. (2014). Analysing Android's Full Disk Encryption Feature. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5, 84-100.
MLA:
Götzfried, Johannes, and Tilo Müller. "Analysing Android's Full Disk Encryption Feature." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 5 (2014): 84-100.
BibTeX: Download