Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Chip chop - smashing the mobile phone secure chip for fun and digital forensics
Norwegian University of Science and Technology (NTNU), Norway.
Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap. Norwegian University of Science and Technology (NTNU), Norway.
Norwegian University of Science and Technology (NTNU), Norway.
Rekke forfattare: 32021 (engelsk)Inngår i: Forensic Science International: Digital Investigation, ISSN 2666-2817, Vol. 37, artikkel-id 301191Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Performing mobile phone acquisition today requires breaking—often hardware assisted—security. In recent years, Embedded Secure Element (eSE) hardware has been introduced in mobile phones, with a view towards increasing the security of critical system features and encrypted user data. The idea being that the eSE should remain secure even if the rest of the system is compromised. The eSE is set to become crucial to modern mobile phone security, challenging Digital Forensics. The eSE is designed to withstand both logical and physical attacks, including side channel attacks, and to keep the attack surface towards the rest of the system/phone small, and complexity low to minimise the risk of implementation errors.

In this paper we adapt current state-of-the-art attacks to the eSE platform and present an attack on an eSE by Samsung, recently introduced in their premium mobile phones. We show how, with limited resources, our approach discovered a vulnerability that could be exploited, leading to a complete compromise of all the eSE security goals and a full loss of future eSE trust, as mitigation of our attack in already fielded devices is challenging. This eSE is Common Criteria EAL 5+ certified and our attack exposes the gap between intended and achieved security, undermining the implied trust in such certifications.

We explain the eSE security design, the details of our attack, and discuss how a single vulnerability can have such devastating security results. The ultimate result of our research facilitates acquisition of affected devices, demonstrating use of offensive methods in advanced Digital Forensic Acquisition.

sted, utgiver, år, opplag, sider
2021. Vol. 37, artikkel-id 301191
Emneord [en]
CC EAL, Mobile security, Digital forensic acquisition, Secure element security, S3K250AF
HSV kategori
Identifikatorer
URN: urn:nbn:se:su:diva-198305DOI: 10.1016/j.fsidi.2021.301191ISI: 000686127700009OAI: oai:DiVA.org:su-198305DiVA, id: diva2:1609386
Tilgjengelig fra: 2021-11-08 Laget: 2021-11-08 Sist oppdatert: 2022-02-25bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekst

Person

Axelsson, Stefan

Søk i DiVA

Av forfatter/redaktør
Axelsson, Stefan
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric

doi
urn-nbn
Totalt: 151 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf