Sciweavers

TRUST
2009
Springer

Attacking the BitLocker Boot Process

14 years 7 months ago
Attacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some versions of Microsoft Windows. It represents a state-of-the-art design, enhanced with TPM support for improved security. We show that, under certain assumptions, a dedicated attacker can circumvent the protection and break confidentiality with limited effort. Our attacks neither exploit vulnerabilities in the encryption itself nor do they directly attack the TPM. They rather exploit sequences of actions that Trusted Computing fails to prevent, demonstrating limitations of the technology.
Sven Türpe, Andreas Poller, Jan Steffan, Jan-
Added 25 May 2010
Updated 25 May 2010
Type Conference
Year 2009
Where TRUST
Authors Sven Türpe, Andreas Poller, Jan Steffan, Jan-Peter Stotz, Jan Trukenmüller
Comments (0)