On Implementing Deniable Storage Encryption for Mobile Devices

On Implementing Deniable Storage Encryption for Mobile Devices

On Implementing Deniable Storage Encryption for Mobile Devices Adam Skillen and Mohammad Mannan Concordia Institute for Information Systems Engineering Concordia University, Montreal, Canada {a skil, mmannan}@ciise.concordia.ca Abstract Some vendors use file based encryption, such as Apple’s iOS, while others implement “full disk encryption” (FDE). Data confidentiality can be effectively preserved through Google introduced FDE in Android 3.0 (for tablets only); encryption. In certain situations, this is inadequate, as FDE is now available for all Android 4.x devices, including users may be coerced into disclosing their decryption keys. tablets and smartphones. In this case, the data must be hidden so that its very exis- tence can be denied. Steganographic techniques and deni- While Android FDE is a step forward, it lacks deniable able encryption algorithms have been devised to address encryption—a critical feature in some situations, e.g., when this specific problem. Given the recent proliferation of users want to provide a decoy key in a plausible manner, smartphones and tablets, we examine the feasibility and ef- if they are coerced to give up decryption keys. Plausibly ficacy of deniable storage encryption for mobile devices. deniable encryption (PDE) was first explored by Canetti et We evaluate existing, and discover new, challenges that can al. [6] for parties communicating over a network. As it ap- compromise plausibly deniable encryption (PDE) in a mo- plies to storage encryption, PDE can be simplified as fol- bile environment. To address these obstacles, we design a lows: different reasonable and innocuous plaintexts may be system called Mobiflage that enables PDE on mobile de- output from a given ciphertext, when decrypted under dif- vices by hiding encrypted volumes within random data on ferent decoy keys. The original plaintext can be recovered a device’s external storage. We leverage lessons learned by decrypting with the true key. In the event that a cipher- from known issues in deniable encryption in the desktop text is intercepted, and the user is coerced into revealing the environment, and design new countermeasures for threats key, she may instead provide a decoy key to reveal a plau- specific to mobile systems. Key features of Mobiflage in- sible and benign decoy message. The Rubberhose filesys- clude: deniable file systems with limited impact on through- tem for Linux (developed by Assange et al. [3]) is the first put; efficient storage use with no data expansion; and re- known instance of a PDE-enabled storage system. striction/prevention of known sources of leakage and dis- Some real-world scenarios may mandate the use of PDE- closure. We provide a proof-of-concept implementation for enabled storage—e.g., a professional/citizen journalist, or the Android OS to assess the feasibility and performance of human rights worker operating in a region of conflict or op- Mobiflage. We also compile a list of best practices users pression. In a recent incident [45], an individual risked his should follow to restrict other known forms of leakage and life to smuggle his phone’s micro SD card, containing ev- collusion that may compromise deniability. idence of atrocities, across international borders by stitch- ing the card beneath his skin. Mobile phones have been extensively used to capture and publish many images and 1 Introduction and Motivation videos of recent popular revolutions and civil disobedience. When a repressive regime disables network connectivity in Smartphones and other mobile computing devices are its jurisdiction, PDE-enabled storage on mobile devices can being widely adopted globally. For instance, according to a provide a viable alternative for data exfiltration. With the comScore report [7], there are more than 119 million smart- ubiquity of smartphones, we postulate that PDE would be phone users in the USA alone, as of Nov. 2012. With this an attractive or even a necessary feature for mobile devices. increased use, the amount of personal/corporate data stored Note, however, that PDE is only a technical measure to pre- in mobile devices has also increased. Due to the sensitive vent a user from being punished if caught with contentious nature of (some of) this data, all major mobile OS man- material; an adversary can always wipe/confiscate the de- ufacturers now include some level of storage encryption. vice itself if such material is suspected to exist. Several existing solutions support full disk encryption appears to perform almost as efficiently as the default with plausible deniability in regular desktop operating sys- Android 4.x encryption for the applications we tested. tems. Possibly the most widely used such tool is True- However, the Mobiflage setup phase takes more time Crypt [46]. To our knowledge, no such solutions exist for than Android FDE, due to a two-pass wipe of the ex- any mainstream mobile OSes, although PDE support is ap- ternal storage (our Nexus S required almost twice as parently more important for these systems, as mobile de- long; exact timing will depend on the size and type of vices are more widely used and portable than laptops or external storage). desktops. Also, porting desktop PDE solutions to mobile devices is not straightforward due to the tight coupling be- The remainder of this paper is organizedas follows. Sec- tween hardware and software components, and intricacies tion 2 presents our threat model and assumptions. In Sec- of the system boot procedure. For example, in Android, tion 3, we describe design choices of Mobiflage deniable the framework must be partially loaded to use the soft key- disk encryption system for mobile devices. In Section 4, we board for collecting decoy/true passwords; and the True- discuss the implementation of Mobiflage for Android. In Crypt bootloader is only designed to chainload Windows. Section 5, we list several measures that must be observed to We introduce Mobiflage, a PDE-enabled storage encryp- maintain deniability in a mobile environment. Section 6 de- tion system for the Android OS. It includes countermea- scribes sources of leakage and attacks that may compromise sures for known attacks against desktop PDE implementa- deniability on a mobile device. We analyze security im- tions (e.g., [10]). We also explore challenges more specific plications and performance of our implementation in Sec- to using PDE systems in a mobile environment, including: tions 7 and 8 respectively. Section 9 discusses related work collusion of cellphone carriers with an adversary; the use and Section 10 concludes. of flash-based storage as opposed to traditional magnetic disks; and file systems such as Ext4 (as used in Android) 2 Threat Model and Assumptions that are not so favorable to PDE. Mobiflage addresses sev- eral of these challenges. However, to effectively offer de- niability, Mobiflage must be widely deployed, e.g., adopted In this section, we discuss Mobiflage’s threat model and in the mainstream Android OS. As such, we implement our operational assumptions, and few legal aspects of using Mobiflage prototype to be compatible with Android 4.x. PDE in general. The major concern with maintaining plau- sible deniability is whether the system will provide some Our contributions include: indication of the existence of any hidden data. Mobiflage’s 1. We explore sources of leakage inherent to mobile de- threat model and assumptions are mostly based on past vices that may compromise deniable storage encryp- work on desktop PDE solutions (cf. TrueCrypt [46]); we tion. Several of these leakage vectors have not been also include threats more specific to mobile devices. analyzed for existing desktop PDE solutions. Threat model and operational assumptions. 2. We present the Mobiflage PDE scheme based on hid- 1. Mobiflage must be merged with the default Android den encrypted volumes—the first such scheme for mo- code stream, or a widely used custom firmware based bile systems to the best of our knowledge. on Android (e.g., CyanogenMod1) to ensure that many 3. We provide a proof-of-concept implementation of devices are capable of using PDE. Then an adversary Mobiflage for Android 4.x (Ice Cream Sandwich and will be unable to make assumptions about the presence Jelly Bean). We incorporated our changes into 4.x of hidden volumes based on the availability of software and maintained the default full disk encryption sys- support. We do not require a large user base to employ tem. During the normal operation of Mobiflage (i.e., PDE; it is sufficient that the capability is widespread, when the user is not using hidden volumes), there are so the availability of PDE will not be a red flag. Simi- no noticeable differences to compromise the existence lar to TrueCrypt [46], all installations of Mobiflage in- of hidden volumes. clude PDE capabilities. There are no identifying tech- nical differences between the default and PDE encryp- 4. We address several challenges specific to Android. For tion modes. However, when more users enable default example, to avoid PDE-unfriendly features of the Ext4 encryption, they help to obscure those that use PDE. file system (as used for the Android userdata partition), 2. Mobiflage currently requires a physical or emulated we implement our hidden volumes (userdata and exter- nal) within the FAT32-based external partition. FAT32 SD card. Devices, such as the Nexus S, which use an internal eMMC partition as opposed to a re- 5. We analyze the performance impact of our implemen- movable SD card are supported. Some devices, such tation during initialization and for data-intensive ap- plications. In a Nexus S device, our implementation 1http://www.cyanogenmod.org/ as the Galaxy Nexus, have neither physical nor em- 9. We assume the adversary cannot capture the user de- ulated external storage. Instead, they use the me- vice while in the PDE mode; otherwise, user data can dia transfer protocol (MTP) and share a single Ext4- be trivially retrieved if the device is unlocked.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    17 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us