47
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      How to Bypass Verified Boot Security in Chromium OS

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Verified boot is an interesting feature of Chromium OS that supposedly can detect any modification in the root file system (rootfs) by a dedicated adversary. However, by exploiting a design flaw in verified boot, we show that an adversary can replace the original rootfs by a malicious rootfs containing exploits such as a spyware or keylogger and still pass the verified boot process. The exploit is based on the fact that a dedicated adversary can replace the rootfs and the corresponding verification information in the bootloader. We experimentally demonstrate an attack using both the base and developer version of Chromium OS in which the adversary installs a spyware in the target system to send cached user data to the attacker machine in plain text which are otherwise encrypted, and thus inaccessible. We also demonstrate techniques to mitigate this vulnerability.

          Related collections

          Most cited references1

          • Record: found
          • Abstract: not found
          • Article: not found

          The growing impact of full disk encryption on digital forensics

            Bookmark

            Author and article information

            Journal
            23 February 2012
            2012-06-02
            Article
            1202.5282
            6fd3f75d-4997-4c61-8d2a-0879e7c87d17

            http://arxiv.org/licenses/nonexclusive-distrib/1.0/

            History
            Custom metadata
            Update information about Chromium OS. Added new and advanced exploits. Added mitigation techniques and evaluation
            cs.CR cs.OS

            Comments

            Comment on this article