Teardown and feasibility study of IronKey – the most secure USB Flash drive

10/27/2021
by   Sergei Skorobogatov, et al.
0

There are many solutions for protecting user data on USB Flash drives. However, the family of IronKey devices was designed with the highest security expectations. They are definitely standing above others by being certified to FIPS 140-2 Level 3 and also claimed as certified by NATO for Top-Secret use. Many encrypted USB drives had been evaluated and found insecure, however, no public research on IronKey devices was made. This feasibility study fills the gap by looking inside the IronKey family of devices. As a result the users of the IronKey devices could be assured about the real level of the security protection they get. Several generations of devices from IronKey family and competitors are teared down, their hardware solutions discussed and evaluated for possible attacks. Some potential flaws are exposed and those findings are likely to stimulate further research into specific solutions aimed to protect user data.

READ FULL TEXT

page 5

page 6

page 7

page 8

page 9

page 10

page 11

page 13

research
10/11/2019

Hardware Security Evaluation of MAX 10 FPGA

With the ubiquity of IoT devices there is a growing demand for confident...
research
07/09/2021

A Survey on RISC-V Security: Hardware and Architecture

The Internet of Things (IoT) is an ongoing technological revolution. Emb...
research
08/28/2019

Confidential Deep Learning: Executing Proprietary Models on Untrusted Devices

Performing deep learning on end-user devices provides fast offline infer...
research
04/19/2021

On Design-time Security in IEC 61499 Systems: Conceptualisation, Implementation, and Feasibility

Cyber-attacks on Industrial Automation and Control Systems (IACS) are ri...
research
11/20/2021

You Overtrust Your Printer

Printers are common devices whose networked use is vastly unsecured, per...
research
08/01/2023

Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case

Media reports show an alarming increase of data breaches at providers of...
research
08/06/2018

Scaling notifications beyond alerts: from subtly drawing attention up to forcing the user to take action

New computational devices, in particular wearable devices, offer the uni...

Please sign up or login with your details

Forgot password? Click here to reset