SafetyPin: Encrypted Backups with Human-Memorable Secrets

10/13/2020
by   Emma Dauterman, et al.
0

We present the design and implementation of SafetyPin, a system for encrypted mobile-device backups. Like existing cloud-based mobile-backup systems, including those of Apple and Google, SafetyPin requires users to remember only a short PIN and defends against brute-force PIN-guessing attacks using hardware security protections. Unlike today's systems, SafetyPin splits trust over a cluster of hardware security modules (HSMs) in order to provide security guarantees that scale with the number of HSMs. In this way, SafetyPin protects backed-up user data even against an attacker that can adaptively compromise many of the system's constituent HSMs. SafetyPin provides this protection without sacrificing scalability or fault tolerance. Decentralizing trust while respecting the resource limits of today's HSMs requires a synthesis of systems-design principles and cryptographic tools. We evaluate SafetyPin on a cluster of 100 low-cost HSMs and show that a SafetyPin-protected recovery takes 1.01 seconds. To process 1B recoveries a year, we estimate that a SafetyPin deployment would need 3,100 low-cost HSMs.

READ FULL TEXT

page 1

page 5

research
08/14/2018

Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark

Practical solutions to bootstrap security in today's information and com...
research
08/07/2018

Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks

Encryption-then-Compression (EtC) systems have been considered for the u...
research
12/20/2017

Securing Edge Networks with Securebox

The number of mobile and IoT devices connected to home and enterprise ne...
research
05/20/2019

simTPM: User-centric TPM for Mobile Devices (Technical Report)

Trusted Platform Modules are valuable building blocks for security solut...
research
10/14/2022

Reflections on trusting distributed trust

Many systems today distribute trust across multiple parties such that th...
research
01/23/2019

Circular All-Or-Nothing: Revisiting Data Protection Against Key Exposure

Rivest's seminal paper introduced the first All-Or-Nothing (AON) method ...
research
06/11/2020

Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout

Recent attacks using thermal laser stimulation (TLS) have shown that it ...

Please sign up or login with your details

Forgot password? Click here to reset