Home | Community | Message Board


This site includes paid links. Please support our sponsors.


Welcome to the Shroomery Message Board! You are experiencing a small sample of what the site has to offer. Please login or register to post messages and view our exclusive members-only content. You'll gain access to additional forums, file attachments, board customizations, encrypted private messages, and much more!

Jump to first unread post Pages: 1
OfflineAnnoA
Experimenter
 User Gallery


Folding@home Statistics
Registered: 06/17/99
Posts: 24,166
Loc: my room
Last seen: 20 days, 1 hour
Cold Boot Attacks on Encryption Keys
    #8059414 - 02/23/08 06:48 AM (15 years, 11 months ago)

http://citp.princeton.edu/memory/

Quote:

Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.






Extras: Filter Print Post Top
OfflineSeussA
Error: divide byzero


Folding@home Statistics
Registered: 04/27/01
Posts: 23,480
Loc: Caribbean
Last seen: 2 months, 20 days
Re: Cold Boot Attacks on Encryption Keys [Re: Anno]
    #8061932 - 02/23/08 06:37 PM (15 years, 11 months ago)

Interesting. On a side note, if trying this, be very careful of condensation when cooling the memory.


--------------------
Just another spore in the wind.


Extras: Filter Print Post Top
Jump to top Pages: 1


Similar ThreadsPosterViewsRepliesLast post
* Encrypted Filesystems windex 1,279 2 10/13/03 12:21 AM
by bsta1n
* 128 Bit Wireless Encryption Cracked Lana 1,781 7 08/20/01 07:12 PM
by Billyblastoff
* Boot from Atapi Cd-rom: Failure... Mojo_Risin 2,337 5 12/15/03 05:47 PM
by Granola
* Hitachi Ships Hard Disk With Built In Hardware Encryption DiploidM 1,931 6 05/14/07 09:57 PM
by Diploid
* Encrypting your messages while using ICQ Lana 3,747 1 06/19/01 06:48 AM
by Anno
* OS with support for encrypted file systems? OJK 1,216 9 07/06/06 06:07 AM
by OJK
* content.IE5 @cro 1,363 4 12/20/03 05:17 PM
by @cro
* Data Encryption BallsDeep 842 3 09/29/06 04:50 AM
by Seuss

Extra information
You cannot start new topics / You cannot reply to topics
HTML is disabled / BBCode is enabled
Moderator: trendal, automan, Northerner
546 topic views. 0 members, 0 guests and 2 web crawlers are browsing this forum.
[ Show Images Only | Sort by Score | Print Topic ]
Search this thread:

Copyright 1997-2024 Mind Media. Some rights reserved.

Generated in 0.026 seconds spending 0.009 seconds on 14 queries.