586,076 active members*
3,802 visitors online*
Register for free
Login
Results 1 to 3 of 3
  1. #1
    Join Date
    Jul 2007
    Posts
    32

    Cold Boot Attacks on Encryption Keys

    Abstract Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay.

    Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.

    See this vid on youtube, Link: [ame="http://www.youtube.com/watch?v=JDaicPIgn9U"]http://www.youtube.com/watch?v=JDaicPIgn9U[/ame]
    Full research paper: http://citp.princeton.edu/pub/coldboot.pdf
    Experiment guide: http://citp.princeton.edu/memory/exp

    Introductory blog post: http://www.freedom-to-tinker.com/?p=1257
    My build log: http://www.mycncuk.com/forums/showthread.php?t=7

  2. #2
    Join Date
    Oct 2007
    Posts
    23
    Scaremongering...

    When someone hostile have that level of physical access on a computer, ram persistence is the last of your worries...

  3. #3
    Join Date
    Apr 2024
    Posts
    2

    Re: Cold Boot Attacks on Encryption Keys

    Cold boot attacks on encryption keys pose a significant threat to data security, leveraging vulnerabilities in system memory to retrieve cryptographic keys even after a system has been shut down. These attacks exploit the persistence of data in RAM, allowing adversaries to recover sensitive information such as encryption keys. In the context of an open source crypto exchange, where secure storage and transmission of digital assets are paramount, mitigating the risk of cold boot attacks becomes imperative. Implementing robust encryption protocols and secure memory wiping mechanisms can help safeguard against such threats, ensuring the integrity and confidentiality of users' assets and transactions.

Similar Threads

  1. How cold is to cold for BP Series I CNC
    By jho5820705 in forum Bridgeport / Hardinge Mills
    Replies: 15
    Last Post: 12-21-2006, 02:13 AM
  2. USB data keys
    By Stevie in forum Mach Software (ArtSoft software)
    Replies: 8
    Last Post: 12-08-2005, 06:48 AM
  3. X-keys are great!
    By Swede in forum CNC (Mill / Lathe) Control Software (NC)
    Replies: 1
    Last Post: 01-04-2005, 05:06 PM
  4. hot keys
    By wireguy in forum Uncategorised CAM Discussion
    Replies: 0
    Last Post: 05-23-2004, 04:07 AM
  5. Dynamic Keys
    By wms in forum OneCNC
    Replies: 1
    Last Post: 07-12-2003, 04:38 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •