Evil maid goes after PGP whole disk encryption

  title={Evil maid goes after PGP whole disk encryption},
  author={Alexandr Ivanovich Tereshkin},
  • A. Tereshkin
  • Published in SIN 7 September 2010
  • Computer Science
Full disk encryption systems are widely used to protect the information from unauthorized access. A common application of such systems is laptop hard drive and removable media encryption, because these can be easily lost or stolen. Indeed, if we assume that an encryption system used by the FDE software is cryptographically strong, correctly implemented and properly used, and that the attacker does not possess a key for the stolen media then the data is safe. However, given physical access to… 

Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes

It is shown that PQC digital signature codes can be subverted in line with previously reported flawed implementations that generate verifiable, but less-secure signatures, demonstrating the risk of such attacks.

Hardware Performance Counters: Ready-Made vs Tailor-Made

It is demonstrated how ready-made hardware performance counters, due to their coarse-grain nature (low sampling rate and bundling of similar events, e.g., number of instructions instead of number of add instructions), are insufficient to this end.

Exfiltrating data from air-gapped computers via ViBrAtIoNs

Full disk encryption and beyond

Two methods to analyse symmetric primitive in the very constraint Key-Dependent Message (KDM) model are introduced which enables to analyse the KDM security of the Even-Mansour and the Key-Alternating Feistel constructions which are the basis of different block-ciphers.

On improving cybersecurity through memory isolation using systems management mode

This thesis describes research into security mechanisms for protecting sensitive areas of memory from tampering or intrusion using the facilities of Systems Management Mode, and focuses on the creation of a small dedicated area to perform cryptographic operations, isolated from the rest of the system.

Architektura bezpieczeństwa systemu netBaltic

W artykule zaprezentowano zalozenia dotyczące zabezpieczania wezlow sieci realizowanej w ramach systemu netBaltic. Ze wzgledu na duzą roznorodnośc rozwazanych mechanizmow komunikacyjnych architektura

Remote Wiping and Secure Deletion on Mobile Devices: A Review

The literature is surveyed, focusing on existing approaches to secure flash storage deletion and a critical analysis and comparison of a variety of published research in this area is provided, to obtain a better understanding of remote wiping.