DocumentCode :
2129797
Title :
On the Practicability of Cold Boot Attacks
Author :
Gruhn, Michael ; Muller, Tim
Author_Institution :
Friedrich-Alexander-Univ., Erlangen-Nurnberg, Germany
fYear :
2013
fDate :
2-6 Sept. 2013
Firstpage :
390
Lastpage :
397
Abstract :
Even though a target machine uses full disk encryption, cold boot attacks can retrieve unencrypted data from RAM. Cold boot attacks are based on the remanence effect of RAM which says that memory contents do not disappear immediately after power is cut, but that they fade gradually over time. This effect can be exploited by rebooting a running machine, or by transplanting its RAM chips into an analysis machine that reads out what is left in memory. In theory, this kind of attack is known since the 1990s. However, only in 2008, Halderman et al. have shown that cold boot attacks can be well deployed in practical scenarios. In the work in hand, we investigate the practicability of cold boot attacks. We verify the claims by Halderman et al. independently in a systematic fashion. For DDR1 and DDR2, we provide results from our experimental measurements that in large part agree with the original results. However, we also point out that we could not reproduce cold boot attacks against modern DDR3 chips. Our test set comprises 17 systems and system configurations, from which 5 are based on DDR3.
Keywords :
cryptography; random-access storage; DDR1; DDR2; DDR3 chips; RAM chips; RAM remanence effect; analysis machine; cold boot attacks; full disk encryption; Cooling; Data mining; Noise; Random access memory; Remanence; Semiconductor device measurement; Temperature measurement; Cold Boot Attack; DDR3; Remanence Effect;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security (ARES), 2013 Eighth International Conference on
Conference_Location :
Regensburg
Type :
conf
DOI :
10.1109/ARES.2013.52
Filename :
6657268
Link To Document :
بازگشت