PROTECTING DATA ON SMARTPHONES AND
TABLETS FROM MEMORY ATTACKS
PATRICK COLP, JIAWEN ZHANG, JAMES GLEESON, SAHIL SUNEJA, EYAL DE LARA,
HIMANSHURAJ, STEFAN SAROIU, AND ALEC WOLMAN
UNIVERSITY OF BRITISH COLUMBIA, ‡UNIVERSITY OF TORONTO, AND ∗MICROSOFT
RESEARCH
Presentation by:
Mana Eskandari
Francisco de Melo jr
TIPS IMPROVE SECURITY ON YOUR
SMARTPHONE
• Use a PIN
• Turn off Wi-Fi and Bluetooth® when not in use
• Download apps just from trusted sources
OUTLINE
• Smartphones components
• Describing the motivation: attacks
• How to prevent them
• Sentry
• Development of this tool
• Evalutation of Performance
• Comparison with similar tools
• Other relevant work
• Critics
SMARTPHONE ARCHITECTURE
• Processor
• Memory
• SoC
DESCRIBING THE ATTACKS
• Cold boot attacks
• DMA attack
• Bus monitoring
HOW CAN WE PREVENT THEM?
• Cold boot attacks
• Other attacks
• JTAG attacks
• Software attacks
SENTRY
Concept
Main caractheristic
AES_encryption x AES_decryption
Implementation in Nvidia and Nexus 4
DEVELOPMENT
• Development of security inside the memory of SoC
RESULT
• 2 % battery consumption for 150 locks/unlocks
SIMILAR TOOLS
• ARM TrustZone
• SGX – Intel Software Guard Extentions
OTHER RELEVANT ARTICLES
• Paper describing Cold boot attacks
• Paper about
CRITICS ABOUT THE PAPER
• Restricted threats
• Third part security analysis
• Software attacks
CONTACT
• Contact from the authors of the paper:
• Contact of the presentation:
• Mana
• Isnaldo Francisco
REFERENCES
• Patrick Colp, Jiawen Zhang, James Gleeson, Sahil Suneja, Eyal de Lara, HimanshuRaj,
Stefan Saroiu, and Alec Wolman
• http://www.verizonwireless.com/mobile-living/network-and-plans/security-app-tips-
to-keep-your-smartphone-secure/

Presentation infonuagique/ cloud computing presentation