We discuss attack scenarios against the TPM-based boot process of BitLocker. Bit Locker is a disk volume encryption feature included in some recent versions of Microsoft Windows. BitLocker is capable of using the TPM to manage all or a portion of its secret encryption keys. Specifically it uses the sealing feature to ensure keys are released only if the platform is in a predefined, trusted state. We present six ways in which an attacker may gain access to secret key material by manipulating the boot process in ways not prevented by the trusted computing technology. We also discuss their causes and contributing factors
Today’s networked computer systems are very vulnerable to attack. The collision-rich hash function d...
This research paper aims to investigate how secure the Windows password storage and user authenticat...
This master thesis deals with ways to store passwords in current operating systems. Specifically, th...
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM...
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TP...
In this paper we describe bugs and ways to attack trusted computing systems based on a static root o...
New versions of Windows come equipped with mechanisms, such as EFS and BitLocker, which are capable ...
Disk encryption has become an important security mea-sure for a multitude of clients, including gove...
In this paper we present the results of our research into security of the Intel ® Trusted Execution ...
Disk encryption has become an important security measure for a multitude of clients, including gover...
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, ret...
Information security presents a huge challenge for both individuals and organizations. The Trusted C...
As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardwa...
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boo...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
Today’s networked computer systems are very vulnerable to attack. The collision-rich hash function d...
This research paper aims to investigate how secure the Windows password storage and user authenticat...
This master thesis deals with ways to store passwords in current operating systems. Specifically, th...
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM...
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TP...
In this paper we describe bugs and ways to attack trusted computing systems based on a static root o...
New versions of Windows come equipped with mechanisms, such as EFS and BitLocker, which are capable ...
Disk encryption has become an important security mea-sure for a multitude of clients, including gove...
In this paper we present the results of our research into security of the Intel ® Trusted Execution ...
Disk encryption has become an important security measure for a multitude of clients, including gover...
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, ret...
Information security presents a huge challenge for both individuals and organizations. The Trusted C...
As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardwa...
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boo...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
Today’s networked computer systems are very vulnerable to attack. The collision-rich hash function d...
This research paper aims to investigate how secure the Windows password storage and user authenticat...
This master thesis deals with ways to store passwords in current operating systems. Specifically, th...