/?pid=4105

Updated:04:41 AM EST Feb 21


this is ggmania.com subsite Cold Boot Attacks on Encryption Keys (+video) - TechAmok

Cold Boot Attacks on Encryption Keys (+video) - [security]
04:12 AM EST - Feb,22 2008 - post a comment

If you think that encrypting your laptop's hard drive will keep your data safe from prying eyes, you may want to think again, according to researchers at Princeton University. They've discovered a way to steal the hard drive encryption key used by products such as Windows Vista's BitLocker or Apple's FileVault. With that key, hackers could get access to all of the data stored on an encrypted hard drive. That's because of a physical property of the computer's memory chips. Data in these DRAM (dynamic RAM) processors disappears when the computer is turned off, but it turns out that this doesn't happen right away, according to Alex Halderman, a Princeton graduate student who worked on the paper. In fact, it can take minutes before that data disappears, giving hackers a way to sniff out encryption keys. The attacker simply turns the computer off for a second or two and then reboots the system from a portable hard disk, which includes software that can examine the contents of the memory chips. This gives an attacker a way around the operating system protection that keeps the encryption keys hidden in memory.
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.


Add your comment (free registrationrequired)

Short overview of recent news articles

Feb,21 2026 Everyone is Buying the Wrong Dash Cam! (2026)
Feb,20 2026 Big Brother on Discord: Leaked Code Shows Age Verification Runs You
Feb,19 2026 OpenClaw’s Top Skill is a Malware that Stole SSH Keys and Opened
Feb,19 2026 Google Adds Satellite SOS to its Affordable Pixel Phone
Feb,19 2026 Phison CEO Warns: AI-Driven NAND and DRAM Shortage Could Bankrupt
Feb,19 2026 NVIDIA CEO hypes up GTC 2026, promises to unveil a chip that will
Feb,19 2026 Microsoft is uploading your confidential emails to Copilot for
Feb,18 2026 Anthropic Releases Claude Sonnet 4.6 with Improved Coding, Computer
Feb,17 2026 Apple Eyeing A Partnership With Chinese Memory Makers YMTC And CXMT
Feb,17 2026 This $60,000 TV was IRRESISTIBLE
Feb,17 2026 Keenadu Android Backdoor Infects Firmware, Spreads via Google Play
Feb,17 2026 Discord's ID Check Nightmare Sparks Massive Exodus to TeamSpeak
Feb,17 2026 Amazing Robot Performance at the 2026 Spring Festival Gala
Feb,16 2026 Apple brings video podcasts and other improvements in iOS 26.4 beta
Feb,16 2026 Dutch Defence Secretary Boldly Claims F-35 Software Could Be
Feb,16 2026 Samsung shows off Galaxy S26 Ultra privacy display
Feb,16 2026 60 Million Passwords Exposed? ETH Zurich Shatters 'Unbreakable'
Feb,15 2026 Apple MacBook with iPhone chip launches next month
Feb,15 2026 Discord's Disturbing Ties to Global Surveillance | ID Verification,
Feb,15 2026 20 Mind-Blowing Tech Gadgets You MUST See in 2026!
Feb,15 2026 Western Digital's HDD production capacity for 2026 is fully sold
Feb,14 2026 Google Releases First Beta Version of Android 17
Feb,14 2026 The Audiophile Gaming Headset - HIFIMAN x ROG Kithara
Feb,14 2026 7zip Malware: Beware 7zip.com
Feb,14 2026 REDMAGIC 11 Pro Review: Can This Be Your ONLY Phone?
Feb,13 2026 Google Docs now has AI-generated audio summaries
Feb,13 2026 Apple Patches Actively Exploited Zero-Day Vulnerability Across
Feb,13 2026 What is the Windows.old folder and can I delete it?
Feb,12 2026 Microsoft AI CEO Mustafa Suleyman: 'Most White Collar Work Will Be
Feb,12 2026 Helldivers Movie Lands November 2027 Release, Jason Momoa to Star
Feb,12 2026 Apple 0-Day Vulnerability Actively Exploited in Sophisticated Attack
Feb,11 2026 Apple releases iOS 26.3 and iPadOS 26.3 to the public
Feb,11 2026 T-Mobile Announces Live Audio Language Translation as a Network
Feb,10 2026 Windows 11 26H1 Drops Exclusively on New Snapdragon X2 Devices - No
Feb,10 2026 Fake 7-Zip downloads are turning home PCs into proxy nodes
Feb,10 2026 Microsoft Patch Tuesday February 2026 - 54 Vulnerabilities Fixed,
Feb,10 2026 Snapdragon X2 Elite Early - Performance Preview
Feb,10 2026 AI Chat App Exposes 300 Million Messages from 25 Million Users
Feb,09 2026 My Kids can Pick ANY Phone They Want For a Present
Feb,09 2026 Microsoft Removes Printer Drivers in Windows 11 Update - What You
>> News Archive <<

TechAmok - Privacy Policy        loading time:0.01secs