<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Some stuff &#187; security</title>
	<atom:link href="http://blog.yhuang.org/?feed=rss2&#038;tag=security" rel="self" type="application/rss+xml" />
	<link>https://blog.yhuang.org</link>
	<description>here.</description>
	<lastBuildDate>Wed, 27 Aug 2025 08:50:58 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1.1</generator>
		<item>
		<title>passwords</title>
		<link>https://blog.yhuang.org/?p=1326</link>
		<comments>https://blog.yhuang.org/?p=1326#comments</comments>
		<pubDate>Sat, 12 Apr 2014 00:51:18 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Access control]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Memory]]></category>
		<category><![CDATA[Moore]]></category>
		<category><![CDATA[reasonably secure]]></category>
		<category><![CDATA[RPSS]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security token]]></category>

		<guid isPermaLink="false">http://allegro.mit.edu/~zong/wpress/?p=1326</guid>
		<description><![CDATA[How many bits of secrecy does a typical person have in memory? After thinking long and hard, I came to the conclusion that all security ends up being physical security. Currently we assume a person&#8217;s body is physically secure, with memory being the most secure part of all. Common security systems, such as passwords, try [...]]]></description>
			<content:encoded><![CDATA[<p>How many bits of secrecy does a typical person have in memory?</p>
<p>After thinking long and hard, I came to the conclusion that all security ends up being physical security. Currently we assume a person&#8217;s body is physically secure, with memory being the most secure part of all. Common security systems, such as passwords, try to extract as much of this secrecy out of us as possible and <u>store it somewhere less secure</u> like on a remote server. This is horrible. I don&#8217;t care that it&#8217;s stored in hashed form: if we only have a finite amount of secrecy to give, then once we reveal it in a form that can be brute-forced, Moore&#8217;s Law will ensure that at some point it will be brute-forced and will no longer be secret.<br />
<span id="more-1326"></span><br />
So we should do less of that, and exploit the real issue, which is physical security. We do have some secrecy storage that are less secure than memory but more secure than an untrusted remote system. For example, we have storage on trusted computers and personal devices; more exotically, we have biometrics and DNA (physical versions, not data of them); and we also have non-replicable behavioral capabilities in the sense that they are driven by stored &#8220;secret&#8221; body states. These things we call &#8220;reasonably physically secure storage&#8221; (RPSS). They are compromisable, and will reveal all their stored secrets if compromised, but they are &#8220;impossible&#8221; to get to without you knowing. Obviously this is technology dependent, and you can potentially get to human memory with superior MRI technology. Or straight up torture works, too.</p>
<p>But let&#8217;s assume there are both physically secure storage (e.g. memory) and freely modifiable RPSS (e.g. storage on phones). We can store on the latter a database of currently <u>computationally secure</u> secrets (e.g. long random passwords of high entropy). This database is protected by a secret we obtain from our memory, of potentially lower entropy than is computationally secure. We want to conserve our memory secrets, so we never use them directly for remote passwords. We only use them to unlock this database of passwords on the RPSS. The untrusted remote server never gets to our memory and never has computationally insecure secrets to store, so it can be compromised all the time and we don&#8217;t care. We only reset the passwords there when computational capability improves or when our RPSS has been compromised. When the latter happens, we obviously need to generate a new database secured by a new secret from our memory before the attacker can compute the secret that unlocks the database. It&#8217;s also possible to secure different parts of the database with different amounts of memory secrets, no different from having different passwords. N-factor authentication can be implemented by sharding the database across several RPSS, secured by the same or different memory secrets. This is really the best we can do.</p>
<p>Currently this is very feasible. Keychain software already do this. But there comes a day when computational capability will far exceed the amount of secrecy that can be held in memory, or memory itself will become exploitable and RPSS, or worse. Then we must ask how much new secrecy can be obtained and stored, and at what rate. At that point, we may as well forget about human memory, as only machines can stay ahead of machines. We&#8217;ll probably have a physically secure implant that collects entropy from the physical proximity, making sure it is not common information accessible to other entities.* These secrets then supply the protection &#8212; in password form or otherwise &#8212; for less physically secure storage.</p>
<p>* Properly speaking we will be authenticating a local physical state that can only formally be called &#8220;me.&#8221;</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.yhuang.org/?feed=rss2&#038;p=1326</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>airline ticket name change</title>
		<link>https://blog.yhuang.org/?p=784</link>
		<comments>https://blog.yhuang.org/?p=784#comments</comments>
		<pubDate>Mon, 26 Dec 2011 05:14:39 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[consumer]]></category>
		<category><![CDATA[dad]]></category>
		<category><![CDATA[everything]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://scripts.mit.edu/~zong/wpress/?p=784</guid>
		<description><![CDATA[A self-styled consumer advocate claims here that &#8220;the non-transferrability rule for tickets is bogus &#8230; it has absolutely nothing to do with security and everything to do with money.&#8221; He says this on account of somebody who was able to get a name changed on a ticket after paying $800 in fees. The best you [...]]]></description>
			<content:encoded><![CDATA[<p>A self-styled consumer advocate <a href="http://www.elliott.org/blog/yes-the-name-on-your-airline-ticket-can-be-changed-thanks-expedia/">claims here</a> that &#8220;the non-transferrability rule for tickets is bogus &#8230; it has absolutely nothing to do with security and everything to do with money.&#8221; He says this on account of somebody who was able to get a name changed on a ticket after paying $800 in fees. The best you can do? No, because in this amazing comment below:</p>
<blockquote><p><strong>Krys</strong><br />
$800?? Wow. Here is what I did and it only cost me about $60.<br />
I had similar problem. The ticket was in my name and i bought it in June 08 for the trip to Poland in December. In July, my grandmother died. Since we did not have a lot of money I decided to give my ticket to my dad. I ran into the same problems trying to change name on the ticket. After whole week of trying I gave up. I looked into changing my dad&#8217;s legal name. And there it was. A process that took about 1 week, $60 in cash, 15 minutes in front of judge and we had my dad&#8217;s first name changed to mine. I was honest with the judge as to why he wanted to change his first name (my dad doesnt speak english). Once we got the approval, we went to secretary of state to get him new license, once we got that we got him new green card (took 2 months) and there he went. He now changed his name back for another $60.</p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://blog.yhuang.org/?feed=rss2&#038;p=784</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>sometimes small is better (part 1)</title>
		<link>https://blog.yhuang.org/?p=537</link>
		<comments>https://blog.yhuang.org/?p=537#comments</comments>
		<pubDate>Sat, 02 Jul 2011 17:50:06 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[canadian customs]]></category>
		<category><![CDATA[Downtown]]></category>
		<category><![CDATA[free snacks]]></category>
		<category><![CDATA[ride]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security checkpoint]]></category>
		<category><![CDATA[security perimeter]]></category>
		<category><![CDATA[series]]></category>
		<category><![CDATA[small planes]]></category>
		<category><![CDATA[visit]]></category>

		<guid isPermaLink="false">http://scripts.mit.edu/~zong/wpress/?p=537</guid>
		<description><![CDATA[&#8230; in air travel. This is part of the Toronto visit series. I sit in this small airport in the middle of Downtown Toronto, wondering why airports can&#8217;t all be like this. YTZ (Billy Bishop) is small, with a single terminal (if it can be called that). There is just one commercial airline, also a [...]]]></description>
			<content:encoded><![CDATA[<p>&#8230; in air travel.</p>
<p><em>This is part of the Toronto visit series.</em></p>
<p>I sit in this small airport in the middle of Downtown Toronto, wondering why airports can&#8217;t all be like this. YTZ (Billy Bishop) is small, with a single terminal (if it can be called that). There is just one commercial airline, also a small company. And its planes are small, four-seat-across propeller aircrafts that I&#8217;ve sworn not to take again after one particularly unpleasant ride years ago, but am taking anyway. More on that later.<br />
<span id="more-537"></span><br />
The inbound wasn&#8217;t all that impressive. You go through Canadian customs, then cross a small canal on what must be the world&#8217;s shortest ferry ride &#8212; I mean you wait for the ferry longer than the ride, which is like 20 seconds &#8212; to the parking lot which also belongs to the airport. The airline provides two shuttles, one to the York Hotel, one to Union Station. To go anywhere else you&#8217;re kind of on your own, but the nearest public trolley buses are a five-minute walk away &#8212; if you know where they are, because there is no information desk. This is the downside of small.</p>
<p>But downside is replaced by upside on the outbound. For such a small airport, US customs is not here, but back on the US side. This is great for saving time. YYZ (Pearson International) is not like this; it has both the Canadian and US customs checkpoints outside the security perimeter. Somehow this also translates into a friendlier security checkpoint at YTZ. You don&#8217;t have to take off your shoes unless they tell you to, you can put your laptop in the same bin as other stuff. Mostly they are <em>not in a hurry</em> because there is nobody in the airport this day &#8212; almost empty. Also note the following:</p>
<table border="1" cellspacing="0">
<tr>
<th>Billy Bishop Airport</th>
<th>Boston Logan Airport</th>
</tr>
<tr>
<td>free wifi</td>
<td>free wifi if you watch ads</td>
</tr>
<tr>
<td>free snacks and drinks</td>
<td>ha</td>
</tr>
<tr>
<td>lounge with nice sofas and lamps</td>
<td>dusty old rocking chairs in the sun</td>
</tr>
</table>
<p>It makes air travel bearable again. A tradeoff exists with small planes, too. They don&#8217;t do too well in turbulence, but in exchange for this possibility, they are quiet and have large seats. Also they seem so&#8230; primitive, and their mechanism so&#8230; accessible, that I couldn&#8217;t help but watch the propellers go around.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.yhuang.org/?feed=rss2&#038;p=537</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IT security policy &#8220;research&#8221;</title>
		<link>https://blog.yhuang.org/?p=103</link>
		<comments>https://blog.yhuang.org/?p=103#comments</comments>
		<pubDate>Sat, 23 Feb 2008 20:23:36 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[charge decay]]></category>
		<category><![CDATA[curious piece]]></category>
		<category><![CDATA[DRAM]]></category>
		<category><![CDATA[dram manufacturers]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[liquid nitrogen]]></category>
		<category><![CDATA[magnitude difference]]></category>
		<category><![CDATA[RAM]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://scripts.mit.edu/~zong/wpress/?p=103</guid>
		<description><![CDATA[&#8220;Researchers find way to steal encrypted data,&#8221; screams this article in the New York Times. Oh do they? But come&#8230; on&#8230;, what is this ridiculous demonstration? Okay, okay, it&#8217;s the IT Policy School over there, let&#8217;s cut them some slack. What they&#8217;ve come up with is a way to read seated DRAM under OS lock [...]]]></description>
			<content:encoded><![CDATA[<p>&#8220;Researchers find way to steal encrypted data,&#8221; screams <a href="http://www.nytimes.com/2008/02/22/technology/22chip.html">this article</a> in the New York Times.</p>
<p>Oh <em>do</em> they? But <em>come&#8230; on&#8230;</em>, what is <a href="http://citp.princeton.edu/memory/">this ridiculous demonstration</a>? Okay, okay, it&#8217;s the IT Policy School over there, let&#8217;s cut them some slack. What they&#8217;ve come up with is a way to read seated DRAM under OS lock without specialized hardware, and if they said that, it would be fine.<br />
<span id="more-103"></span><br />
While I don&#8217;t care for their pseudo-slick presentation and shameless self-promotion (with a &#8220;blog&#8221;?), it is still a curious piece of work. Its unfortunate and regurgitated untechnicality leaves questions, though. DRAM is refreshed in tens of milliseconds, and since DRAM manufacturers are always trying to cut power consumption, I&#8217;m going to assume this rate is necessary to ensure reliable read out. There is a 3-order magnitude difference between that and the seconds to minutes reported that DRAM can be without power and still be read, during which time <em>exponential</em> charge decay takes place. Something else has to be going on, no? It just isn&#8217;t entirely clear that when the computer is turned off momentarily, on-board capacitors or even on-module capacitors aren&#8217;t discharging for long enough to residually power the refresh circuitry [*]. On the other hand, they claim they can remove the RAM completely and (with the help of liquid nitrogen) halt for an hour without power. I have some doubts as they dance around this issue.</p>
<p>As for real implication for security, there isn&#8217;t much, if only because this kind of breach isn&#8217;t fundamental. We already know that once indefinite hardware access to a running machine is first obtained (a practical requirement for this attack), there are always ways to compromise it. That&#8217;s how <a href="http://www.xenatera.com/bunnie/proj/anatak/xboxmod.html">the Xbox was cracked</a> &#8212; I&#8217;m talking about in-parallel probes on pins and traces, which can be just as well applied to the scenario here. Unless there are self-destructive mechanisms or other <em>fundamental</em> barriers to hardware access, we are just dealing with a matter of how high is the effort threshold. To fix it, encryption keys should not be stored in RAM in a detectable way, and any TPM modules that are currently being designed should have additional hardware security measures. That&#8217;s not hard to do, but in the meantime, let&#8217;s sit back and watch an uptick in the cracking of existing software and DRM protection schemes, as protected areas of RAM are opened up to easy hacking &#8212; a far more likely and practical fallout.</p>
<hr size=1>
<p>[*] I just read their full technical documentation, and they seem a little sloppy. They measure (and plot) total module read out error rate, but then fit a curve to it that they justify with MOSFET charge decay characteristics. Isn&#8217;t that right? Well, no: error rate should exhibit the typical digitizing water-fall effect of the comparator circuit.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.yhuang.org/?feed=rss2&#038;p=103</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
