RansomClave: Ransomware Key Management using SGX

07/20/2021
by   Alpesh Bhudia, et al.
0

Modern ransomware often generate and manage cryptographic keys on the victim's machine, giving defenders an opportunity to capture exposed keys and recover encrypted data without paying the ransom. However, recent work has raised the possibility of future enclave-enhanced malware that could avoid such mitigations using emerging support for hardware-enforced secure enclaves in commodity CPUs. Nonetheless, the practicality of such enclave-enhanced malware and its potential impact on all phases of the ransomware lifecyle remain unclear. Given the demonstrated capacity of ransomware authors to innovate in order to better extort their victims (e.g. through the adoption of untraceable virtual currencies and anonymity networks), it is important to better understand the risks involved and identify potential mitigations. As a basis for comprehensive security and performance analysis of enclave-enhanced ransomware, we present RansomClave, a family of ransomware that securely manage their cryptographic keys using an enclave. We use RansomClave to explore the implications of enclave-enhanced ransomware for the key generation, encryption and key release phases of the ransomware lifecycle, and to identify potential limitations and mitigations. We propose two plausible victim models and analyse, from an attacker's perspective, how RansomClave can protect cryptographic keys from each type of victim. We find that some existing mitigations are likely to be effective during the key generation and encryption phases, but that RansomClave enables new trustless key release schemes that could potentially improve attacker's profitability and, by extension, make enclaves an attractive target for future attackers.

READ FULL TEXT
research
07/17/2020

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey

New cryptographic techniques such as homomorphic encryption (HE) allow c...
research
11/11/2019

Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys

Homomorphic encryption (HE) is a promising cryptographic technique for e...
research
12/16/2017

Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure

Encryption has increasingly been used in all applications for various pu...
research
09/21/2021

Comparative Analysis of Cryptographic Key Management Systems

Managing cryptographic keys can be a complex task for an enterprise and ...
research
08/10/2021

One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization

AMD Secure Encrypted Virtualization (SEV) offers protection mechanisms f...
research
05/29/2020

Wallet Attestations for Virtual Asset Service Providers and Crypto-Assets Insurance

The emerging virtual asset service providers (VASP) industry currently f...
research
07/27/2019

Deriving ChaCha20 Key Streams From Targeted Memory Analysis

There can be performance and vulnerability concerns with block ciphers, ...

Please sign up or login with your details

Forgot password? Click here to reset