DSpace About DSpace Software
 

DSpace at Cochin University >
Department of Computer Science >
Seminar Reports >
MTech 2009-2011 Batch >

Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/3500

Title: COLD BOOT ATTACKS ON ENCRYPTION KEYS
Authors: FEBIN E JALAL
Keywords: RESIDUAL MEMORY
IDENTIFYING KEYS IN MEMORY
ATTACKING ENCRYPTED DISKS
Issue Date: 10-Jun-2011
Abstract: Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. This phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We can use cold reboots to mount successful attacks on popular disk encryption systems using no special devices or materials. We can also find cryptographic keys in memory images and correct errors caused by bit decay using algorithms. Here we discuss several strategies for partially mitigating these risks, but there is no simple remedy that would eliminate them.
URI: http://hdl.handle.net/123456789/3500
Appears in Collections:MTech 2009-2011 Batch

Files in This Item:

File Description SizeFormat
COLD BOOT ATTACKS ON Encryption keys.pdf1.55 MBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback