Computer Science Technical Reports
CS at VT

Device-Based Isolation for Securing Cryptographic Keys

Elish, Karim O. and Deng, Yipan and Yao, Danfeng and Kafura, Dennis (2012) Device-Based Isolation for Securing Cryptographic Keys. Technical Report TR-12-21, Computer Science, Virginia Tech.

Full text available as:
PDF - Requires Adobe Acrobat Reader or other PDF viewer.
edbiKeys.pdf (1636105)


In this work, we describe an eective device-based isolation approach for achieving data security. Device-based isolation leverages the proliferation of personal computing devices to provide strong run-time guarantees for the condentiality of secrets. To demonstrate our isolation approach, we show its use in protecting the secrecy of highly sensitive data that is crucial to security operations, such as cryptographic keys used for decrypting ciphertext or signing digital signatures. Private key is usually encrypted when not used, however, when being used, the plaintext key is loaded into the memory of the host for access. In our threat model, the host may be compromised by attackers, and thus the condentiality of the host memory cannot be preserved. We present a novel and practical solution and its prototype called DataGuard to protect the secrecy of the highly sensitive data through the storage isolation and secure tunneling enabled by a mobile handheld device. DataGuard can be deployed for the key protection of individuals or organizations.

Item Type:Departmental Technical Report
Subjects:Computer Science > Software Engineering
ID Code:1213
Deposited By:Administrator, Eprints
Deposited On:31 January 2013