Securing Cryptographic Key Storage on Windows Against Malware

Jeff Sun 1 信誉分
2025-02-21T07:53:50.71+00:00

I'm developing a Windows application with end-to-end encryption and need guidance on securing the Master Key stored on user machines. A compromised Master Key could have severe consequences if exploited by malicious programs. Here are my specific concerns:

  1. Key Storage Vulnerability: While I aim to securely store the Master Key locally, I'm aware that traditional methods (e.g., CNG or Windows Hello) lack inter-process isolation. For example, this HackerOne report demonstrates how keys protected by Windows Hello can still be extracted by malware.
  2. Potential Solution with AppContainer: I’ve explored sandboxing the application via AppContainer to restrict access to the Master Key (e.g., stored in TMP). However, public Microsoft documentation lacks explicit confirmation on whether AppContainer’s isolation mechanisms can prevent malicious processes from accessing cryptographic secrets.
  3. Request for Recommendations: What Windows-specific implementation patterns would ensure that stored keys remain inaccessible to malicious software? Are there proven implementation patterns for achieving true process isolation in this context?

Any insights or references to official guidance would be greatly appreciated.

Windows API - Win32
Windows API - Win32
一组适用于桌面和服务器应用程序的核心 Windows 应用程序编程接口 (API)。 以前称为 Win32 API。
132 个问题
0 个注释 无注释
{count} 票

你的答案

问题作者可以将答案标记为“接受的答案”,这有助于用户了解已解决作者问题的答案。