Demo Blog

What Is a Cold boot attack

by Kang Ricky on Nov.22, 2009, under

a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine from a completely "off" state.The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents which remain readable in the seconds to minutes after power has been removed. Description To execute the attack, the machine is cold booted (power is cycled “off” then “on” without letting the computer shut down cleanly, or, if available, the “reset” button on the computer is pressed); a light-weight operating system is then immediately booted (e.g. from a USB flash drive), and the contents of pre-boot memory dumped to a file. Alternatively, the memory modules are removed from the original system and quickly placed in another machine under the attacker's control, which is then booted to access the memory. Further analysis can then be performed against the information that was retrieved from memory to find the sensitive keys contained in it (automated tools are now available to perform this task). The attack has been demonstrated to be effective against full disk encryption schemes of various vendors and operating systems, even where a Trusted Platform Module (TPM) secure cryptoprocessor is used. This is because the problem is fundamentally a hardware (insecure memory) and not a software issue. While the focus of current research is on disk encryption, any sensitive data held in memory are vulnerable to the attack. The time window for an attack can be extended to hours by cooling the memory modules. Furthermore, as the bits disappear in memory over time, they can be reconstructed, as they fade away in a predictable manner. In the case of disk encryption applications that can be configured to allow the operating system to boot without a pre-boot PIN being entered or a hardware key being present (e.g. Bitlocker in a simple configuration that uses a TPM without a two-factor authentication PIN or USB key), the time frame for the attack is not limited at all: “ Notably, using BitLocker with a Trusted Platform Module (TPM) sometimes makes it less secure, allowing an attacker to gain access to the data even if the machine is stolen while it is completely powered off. MORE INFO: CLICK HERE
0 komentar more...

0 komentar

Posting Komentar

Infolinks In Text Ads

Related Posts with Thumbnails

Advisment

!-- Begin PayPal Logo -->Daftar di PayPal, lalu mulai terima pembayaran menggunakan kartu kredit secara instan.

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!

Information

Free PHP Hosting

Free Image Hosting

Low Cost Website Hosting
Complete directory of low cost web hosting plans offered by the best web hosts.

Biz.ly Free Webhosting
Provides free web hosting plan with short and free subdomain of .Biz.ly, as well as free online site builder with many cool web page templates, easy to setup blog, guestbook, photo album, visitors counter, etc.

FREE Domain Name - www.YOUR-DOMAIN.co.nr
Get a free domain name like www.YourName.co.nr with the following features included: free URL redirection with cloaking, path forwarding, all meta-tags supported, kill-frame feature, NO forced ADS at all, and more.

Blogger Widgets

Free Add Url

Followers