skip to main content
10.1145/2666620.2666627acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Analysis of Secure Key Storage Solutions on Android

Published:07 November 2014Publication History

ABSTRACT

Mobile phones are increasingly used for security sensitive activities such as online banking or mobile payments. This usually involves some cryptographic operations, and therefore introduces the problem of securely storing the corresponding keys on the phone. In this paper we evaluate the security provided by various options for secure storage of key material on Android, using either Android's service for key storage or the key storage solution in the Bouncy Castle library. The security provided by the key storage service of the Android OS depends on the actual phone, as it may or may not make use of ARM TrustZone features. Therefore we investigate this for different models of phones.

We find that the hardware-backed version of the Android OS service does offer device binding -- i.e. keys cannot be exported from the device -- though they could be used by any attacker with root access. This last limitation is not surprising, as it is a fundamental limitation of any secure storage service offered from the TrustZone's secure world to the insecure world. Still, some of Android's documentation is a bit misleading here.

Somewhat to our surprise, we find that in some respects the software-only solution of Bouncy Castle is stronger than the Android OS service using TrustZone's capabilities, in that it can incorporate a user-supplied password to secure access to keys and thus guarantee user consent.

References

  1. Building a secure system using Trustzone Technology. Technical report, ARM Limited, 2009. http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD%29-GENC-009492C_trustzone_security_whitepaper.pdf.Google ScholarGoogle Scholar
  2. Apple cedes market share in smartphone operating system market as Android surges and Windows phone gains, according to IDC, August 2013. http://www.businesswire.com/news/home/20130807005280/en/.Google ScholarGoogle Scholar
  3. T. Cooijmans. Secure key storage and secure computation in Android. Master's thesis, Radboud University Nijmegen, 2014.Google ScholarGoogle Scholar
  4. N. Elenkov. Using ECDH on Android, December 2011. http://nelenkov.blogspot.nl/2011/12/using-ecdh-on-android.html.Google ScholarGoogle Scholar
  5. N. Elenkov. Jelly Bean hardware-backed credential storage, July 2012. http://nelenkov.blogspot.nl/2012/07/jelly-bean-hardware-backed-credenti%al.html.Google ScholarGoogle Scholar
  6. EMVCo. EMV Payment Tokenization Specification. Technical Framework (version 1.0), 2014.Google ScholarGoogle Scholar
  7. W. Enck, M. Ongtang, and P. McDaniel. Understanding Android security. IEEE Security & Privacy, 7(1):50--57, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Trusted User Interface API Specification v1.0. Technical report, Global Platform, 2013.Google ScholarGoogle Scholar
  9. R. Hay and A. Dayan. Android KeyStore stack buffer overflow - CVE-2014--3100, 2014.Google ScholarGoogle Scholar
  10. J. Lerr. Android pin/password cracking: Halloween isn't the only scary thing in October, October 2012. http://linuxsleuthing.blogspot.nl/2012/10/android-pinpassword-cracking-%halloween.html.Google ScholarGoogle Scholar
  11. J. Mick. ARM to bake on-die security into next gen smartphone, tablet, PC cores, april 2012. http://www.dailytech.com/ARM to bake on-die security into next gen smartphone, tablet, PC cores, April 2012. http://www.dailytech.com/ARM+to+Bake+OnDie+Security+Into+Next+Gen+Smartphone+Tablet+PC+Cores/article24372.htm.Google ScholarGoogle Scholar
  12. C. Miller, J. Honoroff, and J. Mason. Security evaluation of Apple's iPhone. Independent Security Evaluators, 19, 2007.Google ScholarGoogle Scholar
  13. Industry leaders announce open platform for mobile devices, 2007. Press release.Google ScholarGoogle Scholar
  14. D. Ortiz-Yepes. A critical review of the EMV Payment Tokenisation Specification. Computer Fraud and Security, 2014. To appear.Google ScholarGoogle ScholarCross RefCross Ref
  15. A. T. Othman, S. Khan, M. Nauman, and S. Musa. Towards a high-level trusted computing API for Android software stack. In Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC '13, pages 17:1--17:9. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Rosenberg. Unlocking the Motorola bootloader, 2013. http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.h%tml.Google ScholarGoogle Scholar
  17. RSA Laboratories. PKCS#12 v1.0: Personal information exchange syntax, 1999.Google ScholarGoogle Scholar
  18. A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer. Google Android: A comprehensive security assessment. IEEE Security and Privacy, 8(2):35--44, March 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Teufl, A. G. Fitzek, D. Hein, A. Marsalek, A. Oprisnik, and T. Zefferer. Android encryption systems. In International Conference on Privacy & Security in Mobile Systems, 2014. To appear.Google ScholarGoogle ScholarCross RefCross Ref
  20. P. Teufl, T. Zefferer, C. Stromberger, and C. Hechenblaikner. iOS encryption systems - deploying iOS devices in security-critical environments. In SECRYPT, pages 170--182, 2013.Google ScholarGoogle Scholar

Index Terms

  1. Analysis of Secure Key Storage Solutions on Android

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SPSM '14: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices
        November 2014
        118 pages
        ISBN:9781450331555
        DOI:10.1145/2666620

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 November 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SPSM '14 Paper Acceptance Rate11of29submissions,38%Overall Acceptance Rate46of139submissions,33%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader