• Skip navigation
  • Skip to navigation
  • Skip to the bottom
Friedrich-Alexander-Universität IT Security Infrastructures Lab
  • FAUTo the central FAU website
  1. Friedrich-Alexander-Universität
  2. Technische Fakultät
  3. Department Informatik
Suche öffnen
  • Campo
  • StudOn
  • FAUdir
  • Jobs
  • Map
  • Help
  1. Friedrich-Alexander-Universität
  2. Technische Fakultät
  3. Department Informatik
Friedrich-Alexander-Universität IT Security Infrastructures Lab
Navigation close
  • Research
    • Forensic Computing Group
    • Human Factors in Security and Privacy Group
    • Multimedia Security
    • Security Education Development Group
    • System Security Group
    • Information Security Group
    • Archive
    • Funded Projects
    • Publications
    Portal Research
  • Lab
    • Staff & Research Groups
    • Alumni
    • Partners
    • FAU i1 Webshop
    Portal Lab
  • Teaching
    • Courses
    • General Information regarding Teaching/Courses
    • Notes on Examinations
    • eTeaching
    • Theses
    • Writing a Thesis at Informatik 1
    Portal Teaching
  • How to reach us
  1. Home
  2. Research
  3. System Security Group
  4. HyperCrypt: Hypervisor-based Encryption of Kernel and User Space

HyperCrypt: Hypervisor-based Encryption of Kernel and User Space

In page navigation: Research
  • Forensic Computing Group
  • Human Factors in Security and Privacy Group
  • Information Security Group
  • Multimedia Security
  • Security Education Development Group
  • System Security Group
    • AppAuth: On App-based Matrix Code Authentication in Online Banking
    • AppTAN (In)Security: (In)Security of App-based TAN Methods in Online Banking
    • AVX Crypto: AVX Instructions to Accelerate Crypto Primitives
    • Bispe: A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
    • Centroid
    • CPU-bound Encryption (TRESOR, TreVisor, ARMORED)
    • FROST: Forensic Recovery Of Scrambled Telephones
    • How Android’s UI Security is Undermined by Accessibility
    • HyperCrypt: Hypervisor-based Encryption of Kernel and User Space
    • N26
    • Nomorp
    • On the Prevalence and Usage of TEE-based Features on Android
    • One Key to Rule Them All: Recovering the Master Key from RAM to break Android's File-Based Encryption
    • RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
    • ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS)
    • RISCoT - Security Analysis of Trusted Execution Environments on RISC-V
    • SED (In)Security: Hardware-based Full Disk Encryption (In)Security
    • SGX-Kernel: Isolating Operating System Components with Intel SGX
    • SGX-Timing: Cache Attacks on Intel SGX
    • SoK: The Evolution of Trusted UI on Mobile
    • Soteria: Offline Software Protection within Low-cost Embedded Devices
    • STARK / MARK: Tamperproof/Mutual Authentication to Resist Keylogging
    • TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs
    • VMAttack: Deobfuscating Virtualization-Based Packed Binaries
  • Archive
  • Funded Projects
  • Publications

HyperCrypt: Hypervisor-based Encryption of Kernel and User Space

HyperCrypt: Hypervisor-based Encryption of Kernel and User Space

Abstract

We present HyperCrypt, a hypervisor-based solution that encrypts the entire kernel and user space to protect against physical attacks on main memory, such as cold boot attacks. HyperCrypt is fully transparent for the guest operating system and all applications running on top of it. At any time, only a small working set of memory pages remains in clear while the vast majority of pages are constantly kept encrypted. By utilizing CPU-bound encryption, the symmetric encryption key is never exposed to RAM. We evaluated our prototype running a standard Linux system with an nginx web sever. With the default configuration of 1024 cleartext pages, successful cold boot attacks are rendered highly unlikely due to large caches of at least 4 MB in modern CPUs. The performance overhead of nginx is raised by factor 1.37 compared to a non-virtualized system.

Paper: HyperCrypt (by Johannes Götzfried, Nico Dörr, Ralph Palutke, and Tilo Müller)
Slides: HyperCrypt Slides (presented at ARES’16, Salzburg, Austria)

Get the Code

Implementation (by Nico Dörr):
hypercrypt-bitvisor-1.4.patch: HyperCrypt patch for BitVisor (Version 1.4)

Lehrstuhl für Informatik 1
Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)

Martensstrasse 3
91058 Erlangen
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Facebook
  • RSS Feed
  • Twitter
  • Xing
Up
Privacy Settings

Our website uses cookies and similar technologies.

Some cookies are necessary for visiting this website, i.e. essential. Otherwise, without these cookies, your end device would not be able to remember your privacy choices, for example.

If you agree, we also use cookies and data to measure your interactions with our website or to integrate external media (e.g. videos).

You can view and withdraw your consent at any time at Privacy policy. On the site you will also find additional information about the cookies and technologies used.

Privacy Settings

Accept all

Save

Accept only essential cookies

Individual privacy settings

Imprint Privacy policy Accessibility

Privacy Settings

Here you will find an overview of all cookies used. You can give your consent to whole categories or display further information and select certain cookies.

Accept all Save Accept only essential cookies

Back

Privacy Settings

Essential cookies enable basic functions and are necessary for the proper function of the website.

Show Cookie Information Hide Cookie Information

Name
Provider Owner of this website
Purpose Saves the visitors preferences selected in the Consent Banner.
Privacy Policy https://www.cs1.tf.fau.de/privacy/
Hosts www.cs1.tf.fau.de
Cookie Name rrze-legal-consent
Cookie Expiry 1 Year
Name
Provider No transmission to third parties
Purpose Test if cookie can be set. Remember User session.
Privacy Policy https://www.cs1.tf.fau.de/privacy/
Hosts .www.cs1.tf.fau.de
Cookie Name wordpress_[*]
Cookie Expiry Session
Name
Provider No transmission to third parties
Purpose Used to manage WebSSO session state.
Privacy Policy https://www.cs1.tf.fau.de/privacy/
Hosts www.cs1.tf.fau.de
Cookie Name SimpleSAMLSessionID,SimpleSAMLAuthToken
Cookie Expiry Session
Name
Provider No transmission to third parties
Purpose Preserves user session state across page requests.
Privacy Policy https://www.cs1.tf.fau.de/privacy/
Hosts www.cs1.tf.fau.de
Cookie Name PHPSESSID
Cookie Expiry Session

Statistics cookies collect information anonymously. This information helps us to understand how our visitors use our website.

Show Cookie Information Hide Cookie Information

Accept
Name
Provider Rosenheimer Str. 143 C, 81671 Munich, Germany
Purpose Used to help record the visitor’s use of the website.
Privacy Policy https://www.siteimprove.com/privacy/privacy-policy/
Hosts siteimprove.com
Cookie Name nmstat
Cookie Expiry 1000 Days

Content from video platforms and social media platforms is blocked by default. If External Media cookies are accepted, access to those contents no longer requires manual consent.

Show Cookie Information Hide Cookie Information

Accept
Name
Provider Twitter International Company, One Cumberland Place, Fenian Street, Dublin 2, D02 AX07, Ireland
Purpose Used to unblock Twitter content.
Privacy Policy https://twitter.com/privacy
Hosts twimg.com, twitter.com
Cookie Name __widgetsettings, local_storage_support_test
Cookie Expiry Unlimited
Accept
Name
Provider Google Ireland Limited, Gordon House, Barrow Street, Dublin 4, Ireland
Purpose Used to unblock YouTube content.
Privacy Policy https://policies.google.com/privacy?hl=en&gl=en
Hosts google.com, youtube.com, youtube-nocookie.com
Cookie Name NID
Cookie Expiry 6 Months
Accept
Name
Provider Vimeo Inc., 555 West 18th Street, New York, New York 10011, USA
Purpose Used to unblock Vimeo content.
Privacy Policy https://vimeo.com/privacy
Hosts player.vimeo.com
Cookie Name vuid
Cookie Expiry 2 Years
Accept
Name
Provider Scribd, Inc., 460 Bryant St, 100, San Francisco, CA 94107-2594 USA
Purpose Used to unblock Slideshare content.
Privacy Policy https://www.slideshare.net/privacy
Hosts www.slideshare.net
Cookie Name __utma
Cookie Expiry 2 Years
Accept
Name
Provider Bayerischer Rundfunk, Rundfunkplatz 1, 80335 Munich, Germany
Purpose Used to unblock BR content.
Privacy Policy https://www.br.de/unternehmen/service/impressum/impressum-datenschutzerklaerung-unternehmen-v2-100.html
Hosts www.br.de
Cookie Name atid
Cookie Expiry 1 Year
Accept
Name
Provider Bayerischer Rundfunk, Rundfunkplatz 1, 80335 Munich, Germany
Purpose Used to unblock ARD content.
Privacy Policy https://www.ardmediathek.de/datenschutz
Hosts www.ardmediathek.de
Cookie Name atidvisitor
Cookie Expiry 1 Year

Imprint Privacy policy Accessibility

Notifications