Defeating cold boot attacks

Researchers at FAU explain how to implement AES in Linux without leaving keys exposed in memory, and with no performance penalty.

TRESOR is a secure implementation of AES which is resistant against cold boot attacks and other attacks on main memory. The basic idea behind this implementation is to store the secret key inside CPU registers rather than in RAM. All computations take place only on registers, no AES state is ever going to RAM. In particular, the x86 debug registers are misused as secure key storage.

A flyingpenguin Guide to RSA 2012

The RSA Conference in San Francisco is already happening. People from all over the world are flying in to meet and greet at the industry-leading security gathering of the year. The RSA Conference brings together an amazing amount of resources to a central and convenient location. It’s a great way to start the year if you are looking for solutions, services or products in security. Marketing hype from vendors is an annoyance but it is a natural result of a concentration of industry leaders and consumers. If you shine a bright enough light you are bound to attract some attention….

Friday night was an intense discussion on Cyberwar to pre-stage David Willson’s Saturday presentation to the American Bar Association InfoSec Committee. Last night continued the discussion over dinner at the historic John’s Grill with a large group of security consultants, lawyers and service providers including Lucy Thomson (editor of the Data Breach and Encryption Handbook) and Ben Thomhave (presenting Thursday’s LAW-301 – Hot Topics in Information Security Law 2012).

Tonight are more of the 70 or so mini-conferences and side gatherings that make up an important part of the discussion and debate around the city and then tomorrow begins the full swing of RSA at the Moscone center.

There are many fine guides online already from insiders like Josh Corman, Andrew Hay and Secorisis. Page 8 and 9 of the RSA Conference booklet also has a guide to the top rated speakers.

Some of the themes to track will be:

  • End-point and platform security, with a transition to secure the bring your own device (BYOD) market against “new” attacks (e.g. CrowdStrike debut of a Webkit-based vulnerability)
  • Encryption, of course and as always but this time it’s really for real
  • Hardening environments with virtualization; call it a sandbox, a litterbox, a container or whatever…vendors are starting to demonstrate how virtualization actually can make security management easier and more cost-effective.

Here are just a few of my presentations as well as some great presenters I plan to watch. Hope to see you there.

  • Tuesday, Feb 28, 1:10 PM — Chris Hoff presents STAR-106 Firewalls: Security, Access, the Cloud — Past, Present and Future
  • Tuesday, Feb 28, 2:40 PM — Bruce Schneier presents EXP-107 New Threats to the Internet Infrastructure
  • Tuesday, Feb 28, 3:50 PM, Room 305 — I will present CLD-108 Lightning Round: Data Confidentiality and Integrity in the Cloud
  • Tuesday, Feb 28, 5:00 PM Tweetup at VMware booth 2041 — VMware and Trend Micro – Securing Your Customers Journey to the Cloud
  • Wednesday, Feb 29, 8:00 AM, Room 102 — Marcus Ranum presents Cyber War: You’re Doing it Wrong!
  • Wednesday, Feb 29 10:20 AM, Crypto Commons — I will interview Bruce Schneier on his new book — Liars and Outliers: Enabling the Trust that Society Needs to Thrive
  • Thursday, Mar 1, 9:30 AM, Room 301 — I will present DAS-302: Message in a Bottle – Finding Hope in a Sea of Security Breach Data
  • Friday, Mar 2, 9:00 AM — Jeremiah Grossman presents EXP-401: Web Breaches in 2011 — “This is becoming hourly and totally rediculous”

We Won the TSA Slogan Competition

I am happy to announce that it has been confirmed that the U.S. Department of Transportation Security Administration (TSA) has chosen a flyingpenguin slogan as their winning entry in a Security Awareness Slogan Contest: “Control, Alt, Delete Before You Leave Your Seat.”

The slogan was posted back in 2006.


Few of us are probably lucky enough to invent something as contagious as a Security-Tubby or a Barney character. Instead, we are stuck with the task of creating “fun” posters with slogans.

One of my more successful ones so far has been based on the saying “Ctrl-Alt-Del when you leave your seat”.

People tell me that no matter how rediculous they might find security slogans at first, eventually this one grows on them and they can’t help but sing it aloud when they leave the office. You know you have won over your users when they start to beg for more effective ways to comply with the “Ctrl-Alt-Del song”.

Apparently it will be used throughout the TSA and perhaps even in other departments. It already is one of my most popular (#6) blog entries of all time.

I thought I should mention it also because a Government CIO article recently suggested there was no good marketing in security awareness:

In short, our users are experiencing the same vacuum of effective messaging about security that the average person watching nothing but fast food commercials would be receiving about health.

Watching nothing but fast food commercials would be a health knowledge vacuum for the average person? Not sure I agree, although I don’t watch them so what do I know?

In any case, as I have presented in “There’s No Patch for Social Engineering“, slogans are not miracles and language is just a tool. But if users are open to communication from their IT department a little word smithing and some poetry can go a long way.