TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Private Key Extraction from Qualcomm Hardware-Backed Keystores

305 pointsby griffinmbabout 6 years ago

9 comments

AdmiralAsshatabout 6 years ago
<a href="https:&#x2F;&#x2F;www.qualcomm.com&#x2F;company&#x2F;product-security&#x2F;bulletins#_CVE-2018-11976" rel="nofollow">https:&#x2F;&#x2F;www.qualcomm.com&#x2F;company&#x2F;product-security&#x2F;bulletins#...</a><p>That&#x27;s pretty much all the snapdragons in modern Android phones (page is not letting me copy+paste them here).<p>Has QC put out a patch yet?<p>EDIT: The April security patch looks like it took care of it:<p><a href="https:&#x2F;&#x2F;source.android.com&#x2F;security&#x2F;bulletin&#x2F;2019-04-01" rel="nofollow">https:&#x2F;&#x2F;source.android.com&#x2F;security&#x2F;bulletin&#x2F;2019-04-01</a><p>EDIT 2: And of course, my Samsung Galaxy S8+, despite having received an update <i>in April</i>, is only at the March 1st security patch level. So I&#x27;m likely vulnerable until Samsung&#x27;s next update.
评论 #19739311 未加载
评论 #19741770 未加载
评论 #19739543 未加载
dlgeekabout 6 years ago
Not the best response from the vendor:<p>&gt; March 19, 2018: Contact Qualcomm Product Security with issue; receive confirmation of receipt<p>&gt; April, 2018: Request update on analysis of issue<p>&gt; May, 2018: Qualcomm confirms the issue and begins working on a fix
评论 #19738931 未加载
评论 #19738999 未加载
ndiscussionabout 6 years ago
Does this allow someone to decrypt a stolen device?<p>I moved from an iPhone to a Galaxy S9 about a year ago because I was getting fed up with Apple&#x27;s hardware problems, and wanted try Android again.<p>I convinced myself that I was able to secure the Android phone as long as I always bought the newest one and kept it up to date.<p>But decryption after loss is an untenable scenario for me. I had read that qualcomm&#x27;s trustzone has had software exploits in the past, but I didn&#x27;t think it would happen again.<p>Is there any way to trust that the data on my Android device is safe? If I lost it today, someone could keep it around for a while until the next exploit drops. Has Apple ever had an exploit of this nature?
评论 #19741434 未加载
评论 #19743027 未加载
评论 #19741110 未加载
Sahhaeseabout 6 years ago
Possibly stupid question: If only a few <i>bits</i> of nonce are needed to recover the key, what&#x27;s preventing iteration of all possible values of those &quot;few bits&quot;?
评论 #19739588 未加载
评论 #19739977 未加载
评论 #19739324 未加载
评论 #19739921 未加载
评论 #19742331 未加载
wemdyjreichertabout 6 years ago
Could this allow bootloader unlocking, custom roms, etc. on an otherwise locked device (e.g. S7)? Tried the engineering bootloader, but horrible battery management.<p>I&#x27;ll avoid updating until I know more.
评论 #19739483 未加载
bubblethinkabout 6 years ago
&gt;We demonstrate this by extracting an ECDSA P-256 private key from the hardware-backed keystore on the Nexus 5X.<p>Did the fixes make it to nexus 5x ? It has been EOL since December 2018. The cve date is CVE-2018-11976 though.
nayukiabout 6 years ago
Related topics:<p>* <a href="https:&#x2F;&#x2F;jochen-hoenicke.de&#x2F;crypto&#x2F;trezor-power-analysis&#x2F;" rel="nofollow">https:&#x2F;&#x2F;jochen-hoenicke.de&#x2F;crypto&#x2F;trezor-power-analysis&#x2F;</a><p>* <a href="https:&#x2F;&#x2F;www.bearssl.org&#x2F;constanttime.html" rel="nofollow">https:&#x2F;&#x2F;www.bearssl.org&#x2F;constanttime.html</a>
评论 #19739768 未加载
fulafelabout 6 years ago
Are there any interesting practical consequences from this in common apps?
评论 #19742612 未加载
VeninVidiaViciiabout 6 years ago
Considering how some carriers refuse to unlock bootloaders, this may well be the only option some of us have to restore bricked phones. Other than paying Google 250 bucks to reflash them.