Difference between pages "BitLocker Disk Encryption" and "Forensics on GPUs"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
 
m (Bibliography)
 
Line 1: Line 1:
'''BitLocker Disk Encryption''' (BDE) is [[Full Volume Encryption]] solution by [[Microsoft]] first included with the Enterprise and Ultimate editions of [[Windows|Windows Vista]]. It is also present in [[Windows|Windows 7]] along with a system for encrypting removable storage media devices, like [[USB]], which is called BitLocker To Go.
+
Using a '''Graphical Processing Unit''' ('''GPU''') for forensics analysis attempts to make use of the significant, parallel processing power available on these high cards for a different purpose than their original intent. The idea of forensic analysis on a GPU was first proposed by Marziale, Richard and Roussev in 2007 with a version of [[Scalpel]] that utilized a GPU.
  
== BitLocker ==
+
== Bibliography ==  
Volumes encrypted with BitLocker will have a different signature than the standard [[NTFS]] header. Instead, they have in their volume header (first sector): <tt>2D 46 56 45 2D 46 53 2D</tt> or, in ASCII, <tt>-FVE-FS-</tt>.
+
* ''[http://www.acsac.org/2006/papers/74.pdf Offloading IDS Computation to the GPU]'', Nigel Jacob and Carla Brodley, ACSAC 2006.
 +
* ''[http://dfrws.org/2007/proceedings/p73-marziale.pdf Massive Threading: Using GPUs to Increase the Performance of Digital Forensics Tools]'', Lodovico Marziale, Golden G. Richard III, and Vassil Roussev, DFRWS 2007.
  
These volumes can be identified by the BitLocker GUID/UUID: 4967d63b-2e29-4ad8-8399-f6a339e3d00.
+
<bibtex>
 
+
@inproceedings{1191892,
The actual data on the encrypted volume is protected with either 128-bit or 256-bit [[AES]] and optionally diffused using an algorithm called Elephant. The key used to do the encryption, the Full Volume Encryption Key (FVEK) and/or TWEAK key, is stored in the BitLocker metadata on the protected volume. The FVEK and/or TWEAK keys are encrypted using another key, namely the Volume Master Key (VMK). Several copies of the VMK are also stored in the metadata. Each copy of the VMK is encrypted using another key, also know as key-protector key. Some of the key-protectors are:
+
author = {Nigel Jacob and Carla Brodley},
* TPM (Trusted Platform Module)
+
title = {Offloading IDS Computation to the GPU},
* Smart card
+
booktitle = {ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference},
* recovery password
+
year = {2006},
* start-up key
+
isbn = {0-7695-2716-7},
* clear key; this key-protector provides no protection
+
pages = {371--380},
* user password
+
doi = {http://dx.doi.org/10.1109/ACSAC.2006.35},
 
+
publisher = {IEEE Computer Society},
BitLocker has support for partial encrypted volumes.
+
address = {Washington, DC, USA},
 
+
  url="http://www.acsac.org/2006/papers/74.pdf"
== BitLocker To Go ==
+
}
Volumes encrypted with BitLocker To Go will have a hybrid encrypted volume, meaning that part of the volume is unencrypted and contains applications to unlock the volume and the other part of the volume is encrypted. The "discovery drive" volume contains BitLocker To Go Reader to read from encrypted volumes on versions of Microsoft [[Windows]] without BitLocker support.
+
</bibtex>
 
+
== manage-bde ==
+
To view the BitLocker Drive Encryption (BDE) status on a running Windows system:
+
<pre>
+
manage-bde.exe -status
+
</pre>
+
 
+
To obtain the recovery password for volume C:
+
<pre>
+
manage-bde.exe -protectors -get C: -Type recoverypassword
+
</pre>
+
 
+
Or just obtain the all “protectors” for volume C:
+
<pre>
+
manage-bde.exe -protectors -get C:
+
</pre>
+
 
+
== See Also ==
+
* [[BitLocker:_how_to_image]]
+
* [[Defeating Whole Disk Encryption]]
+
 
+
== External Links ==
+
 
+
* [http://www.nvlabs.in/archives/1-NVbit-Accessing-Bitlocker-volumes-from-linux.html NVbit : Accessing Bitlocker volumes from linux], 2008
+
* Jesse D. Kornblum, [http://jessekornblum.com/publications/di09.html Implementing BitLocker for Forensic Analysis], ''Digital Investigation'', 2009
+
* [http://en.wikipedia.org/wiki/BitLocker_Drive_Encryption Wikipedia entry on BitLocker]
+
* [http://technet2.microsoft.com/WindowsVista/en/library/c61f2a12-8ae6-4957-b031-97b4d762cf311033.mspx?mfr=true Microsoft's Step by Step Guide]
+
* [http://technet.microsoft.com/en-us/windowsvista/aa906017.aspx Microsoft Technical Overview]
+
* [http://technet.microsoft.com/en-us/magazine/2009.05.win7.aspx An Introduction to Security in Windows 7]
+
* [http://www.microsoft.com/whdc/system/platform/hwsecurity/BitLockerFAQ.mspx Microsoft FAQ]
+
* [http://www.microsoft.com/downloads/details.aspx?FamilyID=131dae03-39ae-48be-a8d6-8b0034c92555&DisplayLang=en Microsoft Description of the Encryption Algorithm]
+
* [http://secude.com/htm/801/en/White_Paper%3A_Cold_Boot_Attacks.htm Cold Boot Attacks, Full Disk Encryption, and BitLocker]
+
* [http://code.google.com/p/libbde/ Project to read BitLocker encrypted volumes]
+
 
+
[[Category:Disk encryption]]
+
[[Category:Windows]]
+

Revision as of 16:38, 9 October 2007

Using a Graphical Processing Unit (GPU) for forensics analysis attempts to make use of the significant, parallel processing power available on these high cards for a different purpose than their original intent. The idea of forensic analysis on a GPU was first proposed by Marziale, Richard and Roussev in 2007 with a version of Scalpel that utilized a GPU.

Bibliography

Nigel Jacob, Carla Brodley - Offloading IDS Computation to the GPU
ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference pp. 371--380, Washington, DC, USA,2006
http://www.acsac.org/2006/papers/74.pdf
Bibtex
Author : Nigel Jacob, Carla Brodley
Title : Offloading IDS Computation to the GPU
In : ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference -
Address : Washington, DC, USA
Date : 2006