• Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Home Service news

Researcher Extracts Encryption Keys From Qualcomm Powered Android Devices

Paul Balo by Paul Balo
July 4, 2016
in Service news
Share on FacebookShare on Twitter

A researcher found a vulnerability with Android’s Full Disk Encryption (FDE) on devices that use Qualcomm’s chip. In a blog post published on Thursday, Gal Beniamini who is an Israeli researcher started by drawing our attention to the stark differences between the iOS encryption which was eventually broken by the FBI and Qualcomm powered Android devices which store encryption keys in software. At the heart of the research according to Ars Technica are two vulnerabilities involving  CVE-2015-6639 and CVE-2016-2431which Google and Qualcomm have both claimed to have been fixed with the first in January and the other in May and have made payout to the researcher in their bug bounty program.

“But researchers from two-factor authentication service Duo Security told Ars that an estimated 37 percent of all the Android phones that use the Duo app remain susceptible to the attack because they have yet to receive the patches. The lack of updates is the result of restrictions imposed by manufacturers or carriers that prevent end users from installing updates released by Google.

What’s more, Gal Beniamini, the independent Israeli researcher who authored the blog post and wrote the exploit code, said that many Android devices that were once vulnerable but later patched—including a Nexus 6 he tested—can be rolled back to their earlier, unprotected state. He suspects the reversion is possible if a device has an unlocked, or unlockable….. researcher that published the post included exploit code that extracts the disk encryption keys by exploiting two vulnerabilities in TrustZone. TrustZone is a collection of security features within the ARM processors Qualcomm sells to handset manufacturers. By stitching together the exploits, the attack code is able to execute code within the TrustZone kernel, which is an enclave dedicated for sensitive operations such as managing cryptographic keys and protecting hardware.”

Commenting further on the strength of encryption of Apple’s iOS devices and Qualcomm powered Android devices, the researcher said “each device has an immutable 256-bit unique key called the UID, which is randomly generated and fused into the device’s hardware at the factory. The key is stored in a way which completely prevents access to it using software or firmware (it can only be set as a key for the AES Engine), meaning that even Apple cannot extract it from the device once it’s been set. This device-specific key is then used in combination with the provided user’s password in order to generate the resulting encryption key used to protect the data on the device. This effectively ‘tangles’ the password and the UID key.”

So even though the American government through the FBI was able to break into the iPhone 5C of the suspected San Bernardino terrorist after reportedly paying a sum of $1m, it’s still very difficult to break into newer iPhones. This is not to say the Android FDE can easily be broken into, it just means you would need a really strong password.

Here are four conclusions from Beniamini’s research in case you don’t want to go through the entire research;

  • The key derivation is not hardware bound. Instead of using a real hardware key which cannot be extracted by software (for example, the SHK). This means the vulnerably is software based and this raises the vulnerability levels for millions of devices.
  • OEMs (original equipment manufacturer) can comply with law enforcement to break Full Disk Encryption. Since the key is available to TrustZone, OEMs could simply create and sign a TrustZone image which extracts the KeyMaster keys and flash it to the target device. This would allow law enforcement to easily brute-force the FDE password off the device using the leaked keys. Brute force was practically impossible in the FBI-Apple case where the FBI tried out many methods.
  • Patching TrustZone vulnerabilities does not necessarily protect you from this issue. Even on patched devices, if an attacker can obtain the encrypted disk image (e.g. by using forensic tools), they can then “downgrade” the device to a vulnerable version, extract the key by exploiting TrustZone, and use them to brute-force the encryption. Since the key is derived directly from the SHK, and the SHK cannot be modified, this renders all down-gradable devices directly vulnerable.
  • Android FDE is only as strong as the TrustZone kernel or KeyMaster. Finding a TrustZone kernel vulnerability or a vulnerability in the KeyMaster trustlet, directly leads to the disclosure of the KeyMaster keys, thus enabling off-device attacks on Android FDE.

Vulnerabilities in the Android operating system have been the subject of researches with some being admitted by Google thereby issuing a fix and eventual bounty payout to the researcher  while others have not been as successful. Again this is not to say Android by itself is the problem, it’s mostly always around third part devices as is the case in this research or apps through which hackers get into Android run devices.

Related Posts:

  • Qualcomm
    Zero-Day Flaw in Qualcomm Chips Exploited to Attack…
  • Oryon_Block_Diagram
    Qualcomm Launches Brand New Chips For Snapdragon Devices
  • qualcomm-extends-support-for-updates-on-android-devices-snapdragon-8-elite
    Qualcomm Aims at Expanding Android Phone Support
  • Chrome-Android-Speedometer-benchmark-1
    Android Device Speedometer Benchmark Scores Are…
  • Win 8
    Qualcomm Tops Estimates with Strong Handset Chip…
  • IMG_0480
    Qualcomm Acquires MovianAI, VinAI's GenAI Division
  • Qualcomm-Snapdragon-4s-Gen-2
    Xiaomi to Debut Snapdragon 4s Gen 2 Phone at 2024…
  • Qualcomm Q3 Earning Beat, Q4 Guidance Comes Short

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: androidqualcommsecurity
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Select Category

    Receive top tech news directly in your inbox

    subscription from
    Loading

    Freshly Squeezed

    • Truecaller Filters Verified Business Messages May 12, 2025
    • ChatGPT Deep Research Now Links to GitHub Repos May 12, 2025
    • Microsoft Offers Guide to Fix Windows Blue Screen Errors May 12, 2025
    • We’ve Invested $10b in Nigeria so Far – MTN May 12, 2025
    • Tech Hype vs. Reality – When Big Tech Missed the Mark Pt. 3 May 11, 2025
    • Google’s Antitrust Showdown, AI vs. Search, and other Headlines May 11, 2025

    Browse Archives

    May 2025
    MTWTFSS
     1234
    567891011
    12131415161718
    19202122232425
    262728293031 
    « Apr    

    Quick Links

    • About TechBooky
    • Advertise Here
    • Contact us
    • Submit Article
    • Privacy Policy

    Recent News

    Truecaller Filters Verified Business Messages

    Truecaller Filters Verified Business Messages

    May 12, 2025
    ChatGPT Deep Research Now Links to GitHub Repos

    ChatGPT Deep Research Now Links to GitHub Repos

    May 12, 2025
    Microsoft Offers Guide to Fix Windows Blue Screen Errors

    Microsoft Offers Guide to Fix Windows Blue Screen Errors

    May 12, 2025
    The NCC Commissioned MTNN To Lease Spectrums From NTEL And Renew Its 3G Spectrum

    We’ve Invested $10b in Nigeria so Far – MTN

    May 12, 2025
    Tech Hype vs. Reality – When Big Tech Missed the Mark Pt. 1

    Tech Hype vs. Reality – When Big Tech Missed the Mark Pt. 3

    May 11, 2025
    Google’s Antitrust Showdown, AI vs. Search, and other Headlines

    Google’s Antitrust Showdown, AI vs. Search, and other Headlines

    May 11, 2025
    • Login

    © 2021 Design By Tech Booky Elite

    Generic selectors
    Exact matches only
    Search in title
    Search in content
    Post Type Selectors
    • African
    • Artificial Intelligence
    • Gadgets
    • Metaverse
    • Tips
    • About TechBooky
    • Advertise Here
    • Submit Article
    • Contact us

    © 2021 Design By Tech Booky Elite

    Discover more from TechBooky

    Subscribe now to keep reading and get access to the full archive.

    Continue reading

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok