Please create an account to participate in the Slashdot moderation system


Forgot your password?

Submission + - Researchers Attack Android's Encryption by Freezing the Smartphone, Literally ( 1

hypnosec writes: Researchers have showcased a novel way through which encrypted data of an Android smartphone can be read by accessing the cryptographic key stored in the phone’s memory by freezing the phone. Two researchers, Tilo Müller and Michael Spreitzenbarth, over at the University of Erlangen in Germany cooled down a Galaxy Nexus phone, loaded with Android 4.0 and with encryption enabled, below 10 degrees by putting it in a freezer. This cooling ensures that the data within the volatile memory is retained for a short period of time without any power supply. To ensure that they still have access to this ‘frozen’ memory content they disconnected and reconnected the battery in less than 500ms such that it results into a reboot. Rebooting the phone in ‘fastboot’ mode, they flashed the FROST recovery image onto the Galaxy Nexus. Connecting the device to a Linux system that had FROST utilities pre-installed the duo, using a special tool that uses the cold boot attack [PDF], went onto to read the contents of the phone's memory including the cryptographic keys.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Researchers Attack Android's Encryption by Freezing the Smartphone, Literally

Comments Filter:

Nothing is finished until the paperwork is done.