• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Attacking the BitLocker boot process
 
  • Details
  • Full
Options
2009
Conference Paper
Title

Attacking the BitLocker boot process

Abstract
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some versions of Microsoft Windows. It represents a state-of-the-art design, enhanced with TPM support for improved security. We show that, under certain assumptions, a dedicated attacker can circumvent the protection and break confidentiality with limited effort. Our attacks neither exploit vulnerabilities in the encryption itself nor do they directly attack the TPM. They rather exploit sequences of actions that Trusted Computing fails to prevent, demonstrating limitations of the technology.
Author(s)
Türpe, S.
Poller, A.
Steffan, J.
Stotz, J.-P.
Trukenmüller, J.
Mainwork
Trusted computing. Second international conference, Trust 2009  
Conference
International Conference on the Technical and Socio-Economic Aspects of Trusted Computing (TRUST) 2009  
Open Access
File(s)
Download (163.39 KB)
Rights
Use according to copyright law
DOI
10.1007/978-3-642-00587-9_12
10.24406/publica-r-362030
Additional link
Full text
Language
English
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
Keyword(s)
  • trusted computing

  • disk encryption

  • security

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024