• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Attacking the BitLocker boot process
 
  • Details
  • Full
Options
2008
Presentation
Title

Attacking the BitLocker boot process

Title Supplement
Presentation held at Research Workshop "Challenges for Trusted Computing" im Rahmen der 3rd European Trusted Infrastructure Summer School (ETISS), held in Oxford, 31st August - 5th September 2008
Abstract
We discuss attack scenarios against the TPM-based boot process of BitLocker. Bit Locker is a disk volume encryption feature included in some recent versions of Microsoft Windows. BitLocker is capable of using the TPM to manage all or a portion of its secret encryption keys. Specifically it uses the sealing feature to ensure keys are released only if the platform is in a predefined, trusted state. We present six ways in which an attacker may gain access to secret key material by manipulating the boot process in ways not prevented by the trusted computing technology. We also discuss their causes and contributing factors.
Author(s)
Türpe, S.
Poller, A.
Steffan, J.
Stotz, J.-P.
Trukenmüller, J.
Conference
European Trusted Infrastructure Summer School (ETISS) 2008  
Research Workshop "Challenges for Trusted Computing" 2008  
File(s)
Download (104.13 KB)
Rights
Use according to copyright law
DOI
10.24406/publica-fhg-358866
Language
English
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
Keyword(s)
  • trusted computing

  • authenticated boot

  • BitLocker

  • Windows Vista

  • disk encryption

  • security

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024