TreVisor: OS-independent software-based full disk encryption secure against main memory attacks

  • Authors:
  • Tilo Müller;Benjamin Taubmann;Felix C. Freiling

  • Affiliations:
  • Department of Computer Science, Friedrich-Alexander University of Erlangen-Nuremberg, Germany;Department of Computer Science, Friedrich-Alexander University of Erlangen-Nuremberg, Germany;Department of Computer Science, Friedrich-Alexander University of Erlangen-Nuremberg, Germany

  • Venue:
  • ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Software-based disk encryption techniques store necessary keys in main memory and are therefore vulnerable to DMA and cold boot attacks which can acquire keys from RAM. Recent research results have shown operating system dependent ways to overcome these attacks. For example, the TRESOR project patches Linux to store AES keys solely on the microprocessor. We present TreVisor, the first software-based and OS-independent solution for full disk encryption that is resistant to main memory attacks. It builds upon BitVisor, a thin virtual machine monitor which implements various security features. Roughly speaking, TreVisor adds the encryption facilities of TRESOR to BitVisor, i. e., we move TRESOR one layer below the operating system into the hypervisor such that secure disk encryption runs transparently for the guest OS. We have tested its compatibility with both Linux and Windows and show positive security and performance results.