/?pid=4105

Updated:05:21 PM EDT Apr 16


this is ggmania.com subsite Cold Boot Attacks on Encryption Keys (+video) - TechAmok

Cold Boot Attacks on Encryption Keys (+video) - [security]
04:12 AM EST - Feb,22 2008 - post a comment

If you think that encrypting your laptop's hard drive will keep your data safe from prying eyes, you may want to think again, according to researchers at Princeton University. They've discovered a way to steal the hard drive encryption key used by products such as Windows Vista's BitLocker or Apple's FileVault. With that key, hackers could get access to all of the data stored on an encrypted hard drive. That's because of a physical property of the computer's memory chips. Data in these DRAM (dynamic RAM) processors disappears when the computer is turned off, but it turns out that this doesn't happen right away, according to Alex Halderman, a Princeton graduate student who worked on the paper. In fact, it can take minutes before that data disappears, giving hackers a way to sniff out encryption keys. The attacker simply turns the computer off for a second or two and then reboots the system from a portable hard disk, which includes software that can examine the contents of the memory chips. This gives an attacker a way around the operating system protection that keeps the encryption keys hidden in memory.
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems BitLocker, FileVault, dm-crypt, and TrueCrypt using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.


Add your comment (free registrationrequired)

Short overview of recent news articles

Apr,16 2024 The NEW Chip Inside Your Phone! (NPUs)
Apr,16 2024 XPS 14 vs 14" MacBook Pro - Apple just KILLED Intel!
Apr,15 2024 The Most 2024 Laptop - Razer Blade 14 Review
Apr,15 2024 NEVER install these programs on your PC... EVER!!!
Apr,14 2024 Use Live Translate on Galaxy S24 series to translate a call's
Apr,14 2024 I Tried a Non-Invasive Blood Sugar Watch. Miracle or Scam?
Apr,13 2024 Samsung Galaxy Ring - This Just Got Interesting
Apr,13 2024 Piracy Is Over Party - WAN Show April 12, 2024
Apr,13 2024 Conan O'Brien Needs a Doctor While Eating Spicy Wings
Apr,13 2024 Beatbox Jcob recreats every sound
Apr,13 2024 Intel is Gunning for NVIDIA
Apr,13 2024 Building a Budget DIY Home Surveillance System
Apr,12 2024 Lenovo Yoga Buyers Guide - What's the Best Thin and Light Laptop
Apr,11 2024 DARK MATTER Trailer (2024) New Sci-Fi Movies 4K
Apr,11 2024 How to Build a PC, the last guide you'll ever need! (2024 Update)
Apr,10 2024 Intel 300 CPU Review - The Pentium Replacement is Finally Here...
Apr,10 2024 Wubuntu, the Dubious Linux Windows
Apr,09 2024 A Lite Version Of Windows 11 To Be Released This Year
Apr,09 2024 This $150 Smartphone might be All You Need
Apr,09 2024 I Can't Believe These are Real - Reacting to Ridiculous PCs on
Apr,08 2024 A new video shows AirPower prototype charging an Apple Watch
Apr,08 2024 Google Deleting Incognito Data, Intel $7B Foundry Loss, $350+ Curved
Apr,08 2024 20 COOL GADGETS YOU SHOULD SEE
Apr,08 2024 New HTTP/2 vulnerability leaves servers in danger of devastating DoS
Apr,07 2024 3D Printed PC Fan Test: Does the Anti-Stall Ring Boost Performance?
Apr,06 2024 The Greatest GPU of All Time: NVIDIA GTX 1080 Ti & GTX 1080 2024
Apr,06 2024 Top NEW RELEASES on Netflix in APRIL 2024
Apr,05 2024 Magician vs Slow-Mo Camera (Skill Challenge)
Apr,05 2024 Re-Ranking All Current GPUs From Worst to Best (2024 Update)
Apr,04 2024 Ripple to ISSUE STABLE COIN utilizing XRP AUTO-Bridging Function
Apr,04 2024 HW News - Intel Battlemage Appears, Open Source GPU, Xbox Handheld
Apr,03 2024 Vivo X Fold 3 Pro Hands-On: The New Best Foldable Hardware
Apr,02 2024 OPNSense: Protect Your Home LAN With a Transparent Filtering Bridge
Mar,31 2024 Ultimate Guide to Virtualization: Run MacOS, Linux, and Windows all
Mar,31 2024 This MIGHT be the best NAS on the market
Mar,31 2024 What do Zen 5, Arc Battlemage and NVIDIA RTX 50 GPUs Have In Common?
Mar,31 2024 They FIXED the Dual Chamber Problem!
Mar,30 2024 Paying for Cloud Storage is Stupid
Mar,30 2024 Entire Case Company Built on Literal Theft
Mar,30 2024 Red Hat warns of backdoor in XZ tools used by most Linux distros
>> News Archive <<

TechAmok - Privacy Policy        loading time:0.01secs