Statement on Legal Impediments to Cybersecurity Research May 1, 2015 (Updated May 21, 2015)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Legacy of Export-Grade Cryptography in the 21St Century
The legacy of export-grade cryptography in the 21st century Nadia Heninger University of Pennsylvania October 6, 2016 International Traffic in Arms Regulations April 1, 1992 version Category XIII--Auxiliary Military Equipment ... (b) Information Security Systems and equipment, cryptographic devices, software, and components specifically designed or modified therefore, including: (1) Cryptographic (including key management) systems, equipment, assemblies, modules, integrated circuits, components or software with the capability of maintaining secrecy or confidentiality of information or information systems, except cryptographic equipment and software as follows: (i) Restricted to decryption functions specifically designed to allow the execution of copy protected software, provided the decryption functions are not user-accessible. (ii) Specially designed, developed or modified for use in machines for banking or money transactions, and restricted to use only in such transactions. Machines for banking or money transactions include automatic teller machines, self-service statement printers, point of sale terminals or equipment for the encryption of interbanking transactions. ... Timeline of US cryptography export control I Pre-1994: Encryption software requires individual export license as a munition. I 1994: US State Department amends ITAR regulations to allow export of approved software to approved countries without individual licenses. 40-bit symmetric cryptography was understood to be approved under this scheme. I 1995: Netscape develops initial SSL protocol. I 1996: Bernstein v. United States; California judge rules ITAR regulations are unconstitutional because \code is speech" I 1996: Cryptography regulation moved to Department of Commerce. I 1999: TLS 1.0 standardized. I 2000: Department of Commerce loosens regulations on mass-market and open source software. Commerce Control List: Category 5 - Info. -
A Critique of the Digital Millenium Copyright Act's
THINKPIECE ACRITIQUE OF THE DIGITAL MILLENIUM COPYRIGHT ACT’S EXEMPTION ON ENCRYPTION RESEARCH: IS THE EXEMPTION TOO NARROW? VICKY KU I. INTRODUCTION.................................................................. 466 II. PART I: WHAT IS ENCRYPTION RESEARCH? ABRIEF HISTORY470 III. PART II: OVERVIEW OF SECTION 1201(A)(1) OF THE DMCA474 A. WHAT DOES IT SAY?.................................................... 474 B. WHAT WAS ITS INTENDED PURPOSE? .......................... 474 C. WHAT IS THE PURPOSE OF 1201(G)? ........................... 475 IV.PART III: IMPACT OF SECTION 1201(G) OF THE DMCA ON ENCRYPTION RESEARCH .................................................. 485 A. WHO IN THE ACADEMIC COMMUNITY HAS BEEN AFFECTED? .................................................................................. 485 V. PART IV: PROPOSED CHANGES TO THE DMCA.................. 488 VI.CONCLUSION ..................................................................... 489 Jointly reviewed and edited by Yale Journal of Law & Technology and International Journal of Communications Law & Policy. Author’s Note. 466 YALE JOURNAL OF LAW &TECHNOLOGY 2004-2005 ACRITIQUE OF THE DIGITAL MILLENIUM COPYRIGHT ACT’S EXEMPTION ON ENCRYPTION RESEARCH: IS THE EXEMPTION TOO NARROW? VICKY KU Section 1201(g) of the Digital Millennium Copyright Act (DMCA) is offered as an exemption for encryption research.1 However, the drafting of the exemption contradicts the purpose of copyright legislation under the terms of the Constitution, which is based upon the idea that the welfare -
1 in the SUPERIOR COURT of FULTON COUNTY STATE of GEORGIA DONNA CURLING, an Individual; ) ) COALITION for GOOD ) GOVERNANC
IN THE SUPERIOR COURT OF FULTON COUNTY STATE OF GEORGIA DONNA CURLING, an individual; ) ) COALITION FOR GOOD ) GOVERNANCE, a non-profit corporation ) organized and existing under Colorado ) Law; ) ) DONNA PRICE, an individual; ) ) JEFFREY SCHOENBERG, an individual; ) ) LAURA DIGGES, an individual; ) ) WILLIAM DIGGES III, an individual; ) ) RICARDO DAVIS, an individual; ) ) Plaintiffs, ) ) v. ) CIVIL ACTION ) FILE NO.: 2017cv292233 BRIAN P. KEMP, in his individual ) capacity and his official capacity as ) Secretary of State of Georgia and ) Chair of the STATE ELECTION BOARD; ) DEMAND FOR ) JURY TRIAL DAVID J. WORLEY, REBECCA N. ) SULLIVAN, RALPH F. “RUSTY” ) SIMPSON, and SETH HARP, in their ) individual capacities and their official ) capacities as members of the STATE ) ELECTION BOARD; ) ) THE STATE ELECTION BOARD; ) ) RICHARD BARRON, in his individual ) capacity and his official capacity as ) 1 Director of the FULTON COUNTY ) BOARD OF REGISTRATION AND ) ELECTIONS; ) ) MARY CAROLE COONEY, VERNETTA ) NURIDDIN, DAVID J. BURGE, STAN ) MATARAZZO and AARON JOHNSON ) in their individual capacities and official ) capacities as members of the FULTON ) COUNTY BOARD OF REGISTRATION ) AND ELECTIONS; ) ) THE FULTON COUNTY BOARD OF ) REGISTRATION AND ELECTIONS; ) ) MAXINE DANIELS, in her individual ) capacity and her official capacity as ) Director of VOTER REGISTRATIONS ) AND ELECTIONS FOR DEKALB ) COUNTY; ) ) MICHAEL P. COVENY, ANTHONY ) LEWIS, LEONA PERRY, SAMUEL ) E. TILLMAN, and BAOKY N. VU ) in their individual capacities and official ) capacities as members of the DEKALB ) COUNTY BOARD OF REGISTRATIONS ) AND ELECTIONS; ) ) THE DEKALB COUNTY BOARD OF ) REGISTRATIONS AND ELECTIONS; ) ) JANINE EVELER, in her individual ) capacity and her official capacity as ) Director of the COBB COUNTY ) BOARD OF ELECTIONS AND ) REGISTRATION; ) ) PHIL DANIELL, FRED AIKEN, JOE ) PETTIT, JESSICA BROOKS, and ) 2 DARRYL O. -
The Anti-Circumvention Amendments to the Hong Kong Copyright Ordinance
Learning the Hard Way: The Anti-Circumvention Amendments to the Hong Kong Copyright Ordinance Robert S. Rogoyski* The 2007 Hong Kong Copyright Amendment Ordinance was passed as part of continuing efforts to balance the interests of copyright owners with the public benefits that flow from the use of copyrighted works. The anticircumvention provisions in the ordinance, closely modeled on the U.S. Digital Millennium Copyright Act (DMCA), create a complex new regime that regulates the circumvention of copy and access controls to copyrighted works, and contains a set of narrow exceptions for some scientific research. Both the specific text of the amendments, and U.S. experience with similar provisions in the DMCA give rise to serious concerns about the potential effects of this legislation. The anticircumvention amendments threaten fair dealing rights in Hong Kong because they unduly expand the power of copyright owners to control the actual use of their works, rendering fair dealing rights moot. Although the amendments provide exceptions for cryptography and security testing, the wording of the exceptions is problematic, and U.S. experience with very similar provisions in the DMCA shows that they will nevertheless chill legitimate research and harm consumers. I. INTRODUCTION ................................................................................... 36 II. THE CO ANTICIRCUMVENTION AMENDMENTS POSE A SERIOUS THREAT TO FAIR DEALING RIGHTS IN HONG KONG ............ 37 A. How Can This Be? ................................................................... -
Lest We Remember: Cold Boot Attacks on Encryption Keys
Lest We Remember: Cold Boot Attacks on Encryption Keys J. Alex Halderman*, Seth D. Schoen†, Nadia Heninger*, William Clarkson, William Paul‡, Joseph A. Calandrino*, Ariel J. Feldman*, Jacob Appelbaum and Edward W. Felten* *Princeton University †Electronic Frontier Foundation ‡Wind River Systems USENIX Security Symposium, 2008 Presented by: Andra-Maria Ilieș Seminar in Computer Architecture 1 Executive summary ■ Problem: DRAMs lose their data gradually after the power is cut ■ Goal: Present a new type of attack which exploits remanence effect ■ Method: ■ Acquire usable full-system memory image ■ Extract cryptographic key ■ Gain access to secret data ■ Evaluation: succeeded on most popular disk encryption systems 2 Background, Problem & Goal 3 DRAM ■ A DRAM cell consists of a capacitor and an access transistor. ■ It stores data in terms of change in the capacitor. wordline access transistor bitline bitline storage bitline capacitor 4 DRAM refresh ■ DRAM capacitor charge leaks over time ■ Each DRAM row is refreshed periodically to restore charge ■ Period usually is 64 ms ■ Retention time: maximum time a cell can go without being refreshed while maintaining its stored data ■ Decay: bit flips caused by charge leak ■ Cell leak = cell decays to ground state ■ When powered off DRAM loses its data completely 5 Retention time and temperature ■ Contents survive at some extent even at room temperature ■ LINK, W., AND MAY, H. Eigenschaften von MOS - Ein Transistorspeicherzellen bei tiefen Temperaturen. Archiv fur Elekotronik und Ubertragungstechnik 33 (June 1979), 229–235 ■ DRAM showed no data loss for a full week without refresh when cooled with liquid nitrogen ■ Retention time can be increased by cooling 6 Retention time and booting ■ Chow, Jim & Pfaff, Ben & Garfinkel, Tal & Rosenblum, Mendel. -
Case 2:16-Cv-06287-PD Document 8 Filed 12/06/16 Page 1 of 74
Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 1 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 2 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 3 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 4 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 5 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 6 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 7 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 8 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 9 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 10 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 11 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 12 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 13 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 14 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 15 of 74 Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 16 of 74 Exhibit A Case 2:16-cv-06287-PD Document 8 Filed 12/06/16 Page 17 of 74 J. -
ACLU V. Clapper
Case 1:13-cv-03994-WHP Document 27 Filed 08/26/13 Page 1 of 35 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK AMERICAN CIVIL LIBERTIES UNION; AMERICAN CIVIL LIBERTIES UNION FOUNDATION; NEW YORK CIVIL LIBERTIES UNION; and NEW YORK CIVIL LIBERTIES UNION FOUNDATION, Plaintiffs, DECLARATION OF PROFESSOR v. EDWARD W. FELTEN JAMES R. CLAPPER, in his official capacity as Director of National Intelligence; KEITH B. Case No. 13-cv-03994 (WHP) ALEXANDER, in his official capacity as Director of the National Security Agency and Chief of the ECF CASE Central Security Service; CHARLES T. HAGEL, in his official capacity as Secretary of Defense; ERIC H. HOLDER, in his official capacity as Attorney General of the United States; and ROBERT S. MUELLER III, in his official capacity as Director of the Federal Bureau of Investigation, Defendants. DECLARATION OF PROFESSOR EDWARD W. FELTEN I, Edward W. Felten, declare under penalty of perjury, pursuant to 28 U.S.C. § 1746, that the following is true and correct: 1. The plaintiffs in this lawsuit have challenged what they term the “mass call-tracking” program of the National Security Agency, and they have asked me to explain the sensitive nature of metadata, particularly when obtained in the aggregate. Below, I discuss how advances in technology and the proliferation of metadata-producing devices, such as phones, have produced rich metadata trails. Many details of our lives can be gleaned by examining those trails, which often yield information more easily than do the actual content of our communications. Case 1:13-cv-03994-WHP Document 27 Filed 08/26/13 Page 2 of 35 Superimposing our metadata trails onto the trails of everyone within our social group and those of everyone within our contacts’ social groups, paints a picture that can be startlingly detailed. -
1 Comment Of
Comment of: Edward W. Felten Professor of Computer Science and Public Affairs J. Alex Halderman Department of Computer Science 35 Olden Street Princeton, NJ 08544 Princeton University Represented by: Deirdre K. Mulligan Director Aaron Perzanowski Law Clinic Intern Samuelson Law, Technology & Public Policy Clinic Boalt Hall University of California 346 North Addition Berkeley, CA 94720-7200 Office of the General Counsel U.S. Copyright Office James Madison Memorial Building, Room LM-401 101 Independence Avenue, SE. Washington, DC 20559-6000 December 1, 2005 Re: RM 2005-11 – Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies I. Proposed Class Of Works We respectfully request an exemption to § 1201(A)(1)(a) for sound recordings and audiovisual works distributed in compact disc format and protected by technological measures that impede access to lawfully purchased works by creating or exploiting security vulnerabilities that compromise the security of personal computers. The creation of security vulnerabilities includes running or installing rootkits or other software code that jeopardize the security of a computer or the data it contains. The exploitation of security vulnerabilities includes running or installing software protection measures without conspicuous notice and explicit consent and failing to provide a permanent and complete method of uninstalling or disabling the technological measure. 1 II. Summary of Argument Technological measures protecting works distributed on Compact Discs have been found to pose unreasonable security risks to consumers’ personal computers, corporate and government networks and the information infrastructure as a whole. Vulnerabilities inherent in widely distributed CD protection measures create the potential for a frightening range of abuses. -
Case 1:13-Cv-03994-WHP Document 26 Filed 08/26/13 Page 1 of 48
Case 1:13-cv-03994-WHP Document 26 Filed 08/26/13 Page 1 of 48 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK AMERICAN CIVIL LIBERTIES UNION; AMERICAN CIVIL LIBERTIES UNION FOUNDATION; NEW YORK CIVIL LIBERTIES UNION; and NEW YORK CIVIL LIBERTIES UNION FOUNDATION, Plaintiffs, v. No. 13-cv-03994 (WHP) JAMES R. CLAPPER, in his official capacity as ECF CASE Director of National Intelligence; KEITH B. ALEXANDER, in his official capacity as Director of the National Security Agency and Chief of the Central Security Service; CHARLES T. HAGEL, in his official capacity as Secretary of Defense; ERIC H. HOLDER, in his official capacity as Attorney General of the United States; and ROBERT S. MUELLER III, in his official capacity as Director of the Federal Bureau of Investigation, Defendants. MEMORANDUM OF LAW IN SUPPORT OF PLAINTIFFS’ MOTION FOR A PRELIMINARY INJUNCTION Case 1:13-cv-03994-WHP Document 26 Filed 08/26/13 Page 2 of 48 TABLE OF CONTENTS TABLE OF AUTHORITIES .......................................................................................................... ii Introduction ..................................................................................................................................... 1 Legal and Factual Background ....................................................................................................... 2 I. The Foreign Intelligence Surveillance Act ......................................................................... 2 II. The Mass Call-Tracking Program ...................................................................................... -
Cold Boot Attacks on Encryption Keys
Lest We Remember: Cold Boot Attacks on Encryption Keys † ‡ J. Alex Halderman∗, Seth D. Schoen , Nadia Heninger∗, William Clarkson∗, William Paul , Joseph A. Calandrino∗, Ariel J. Feldman∗, Jacob Appelbaum, and Edward W. Felten∗ † ‡ ∗ Princeton University Electronic Frontier Foundation Wind River Systems jhalderm, nadiah, wclarkso, jcalandr, ajfeldma, felten @cs.princeton.edu { } [email protected], [email protected], [email protected] Abstract memory. They pose a particular threat to laptop users who rely on disk encryption products, since an adversary who Contrary to popular assumption, DRAMs used in most steals a laptop while an encrypted disk is mounted could modern computers retain their contents for several sec- employ our attacks to access the contents, even if the com- onds after power is lost, even at room temperature and puter is screen-locked or suspended. We demonstrate this even if removed from a motherboard. Although DRAMs risk by defeating several popular disk encryption systems, become less reliable when they are not refreshed, they including BitLocker, TrueCrypt, and FileVault, and we are not immediately erased, and their contents persist expect many similar products are also vulnerable. sufficiently for malicious (or forensic) acquisition of us- able full-system memory images. We show that this phe- While our principal focus is disk encryption, any sen- nomenon limits the ability of an operating system to pro- sitive data present in memory when an attacker gains tect cryptographic key material from an attacker with physical access to the system could be subject to attack. physical access. We use cold reboots to mount successful Many other security systems are probably vulnerable. -
12/07/16 Page 1 of 8
Case: 3:16-cv-00795-jdp Document #: 27 Filed: 12/07/16 Page 1 of 8 Case: 3:16-cv-00795-jdp Document #: 27 Filed: 12/07/16 Page 2 of 8 Case: 3:16-cv-00795-jdp Document #: 27 Filed: 12/07/16 Page 3 of 8 Case: 3:16-cv-00795-jdp Document #: 27 Filed: 12/07/16 Page 4 of 8 Case: 3:16-cv-00795-jdp Document #: 27 Filed: 12/07/16 Page 5 of 8 Case: 3:16-cv-00795-jdp Document #: 27 Filed: 12/07/16 Page 6 of 8 Case: 3:16-cv-00795-jdp Document #: 27 Filed: 12/07/16 Page 7 of 8 Case: 3:16-cv-00795-jdp Document #: 27 Filed: 12/07/16 Page 8 of 8 Case: 3:16-cv-00795-jdp Document #: 27-1 Filed: 12/07/16 Page 1 of 22 Exhibit A Case: 3:16-cv-00795-jdp Document #: 27-1 Filed: 12/07/16 Page 2 of 22 J. Alex Halderman 2260 Hayward Street Ann Arbor, mi 48109 usa Professor, Computer Science and Engineering (mobile) +1 609 558 2312 University of Michigan [email protected] November 4, 2016 J.AlexHalderman.com Research Overview My research focuses on computer security and privacy, with an emphasis on problems that broadly impact society and public policy. Topics that interest me include software security, network security, data privacy, anonymity, surveillance, electronic voting, censorship resistance, digital rights management, computer forensics, ethics, and cybercrime. I’m also interested in the interaction of technology with law, regulatory policy, and international affairs. -
Practical State Recovery Attacks Against Legacy RNG Implementations
Practical state recovery attacks against legacy RNG implementations Shaanan N. Cohney Matthew D. Green Nadia Heninger University of Pennsylvania Johns Hopkins University University of Pennsylvania [email protected] [email protected] [email protected] ABSTRACT 1 INTRODUCTION The ANSI X9.17/X9.31 pseudorandom number generator design was Random number generation is a vital component of any crypto- first standardized in 1985, with variants incorporated into numerous graphic system. While systems may survive subtle flaws in crypto- cryptographic standards over the next three decades. The design graphic algorithm implementation, the ability to predict the output uses timestamps together with a statically keyed block cipher to of a (pseudo)random number generator typically leads to the cata- produce pseudo-random output. It has been known since 1998 that strophic failure of any protocol built on top of it. In recent years the key must remain secret in order for the output to be secure. a number of cryptographic systems have been found to include However, neither the FIPS 140-2 standardization process nor NIST’s flawed random and pseudorandom number generation subsystems. later descriptions of the algorithm specified any process for key These flaws range from subtle weaknesses, e.g. biases that admit generation. sophisticated attacks against the protocol [49]; to catastrophic vul- We performed a systematic study of publicly available FIPS 140- nerabilities that allow for adversarial recovery of all random coins 2 certifications for hundreds of products that implemented the used in a protocol execution [16, 59]. In a particularly ominous ANSI X9.31 random number generator, and found twelve whose development, some of these flaws appear to have been deliberately certification documents use of static, hard-coded keys in source engineered.