Freezing a Smartphone for Hour to Circumvent the Encryption System?

By

Its sounds like a scene out of James Bond movie, but someone can actually circumvent a smartphones’ complex encryption system and retrieve its confidential information by putting it in a freezer.

The discovery was recently released by German researchers at Erlangen's Friedrich-Alexander University (FAU). They froze a smartphone for an hour. The researchers – Tilo Muller, Michael Spreitzenbarth and Felix Freiling – were able to get the device’s temperature down to -10C. Data was later analyzed on a separate computer.

They were able to see contact lists, websites visited and photos, the BBC reported. These could all reveal important details on suspected criminals or terrorists.

“We show that cold boot attacks are more generic and allow to retrieve sensitive information, such as contact lists, visited web sites, and photos, directly from RAM, even though the bootloader is locked,” the researchers said in the study.

It was also found that the quick “connecting and disconnecting” of the battery “of a frozen phone forced the handset into a vulnerable mode,” the BBC said. “This loophole let them start it up with some custom-built software rather than its onboard Android operating system. The researchers dubbed their custom code Frost - Forensic Recovery of Scrambled Telephones.” The researchers used a Samsung Galaxy Nexus smartphone in their study, according to a news report.

Data scrambling was introduced by Google with the Android version commonly known as the “Ice Cream Sandwich.” But the scrambling system was a "nightmare" for police as they investigated crimes, the researchers said in a blog post. So the discovery could be a welcome find for law enforcement officials.

It was also found that data “fades from memory much more slowly when chips are cold which allowed them to grab the encryption keys and speed up unscrambling the contents of a phone,” the BBC adds.




Edited by Brooke Neuman

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More