What Is a Cold boot attack
by Kang Ricky on Nov.22, 2009, under Cryptography
a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine from a completely "off" state.The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents which remain readable in the seconds to minutes after power has been removed.
Description
To execute the attack, the machine is cold booted (power is cycled “off” then “on” without letting the computer shut down cleanly, or, if available, the “reset” button on the computer is pressed); a light-weight operating system is then immediately booted (e.g. from a USB flash drive), and the contents of pre-boot memory dumped to a file. Alternatively, the memory modules are removed from the original system and quickly placed in another machine under the attacker's control, which is then booted to access the memory. Further analysis can then be performed against the information that was retrieved from memory to find the sensitive keys contained in it (automated tools are now available to perform this task).
The attack has been demonstrated to be effective against full disk encryption schemes of various vendors and operating systems, even where a Trusted Platform Module (TPM) secure cryptoprocessor is used. This is because the problem is fundamentally a hardware (insecure memory) and not a software issue. While the focus of current research is on disk encryption, any sensitive data held in memory are vulnerable to the attack.
The time window for an attack can be extended to hours by cooling the memory modules. Furthermore, as the bits disappear in memory over time, they can be reconstructed, as they fade away in a predictable manner. In the case of disk encryption applications that can be configured to allow the operating system to boot without a pre-boot PIN being entered or a hardware key being present (e.g. Bitlocker in a simple configuration that uses a TPM without a two-factor authentication PIN or USB key), the time frame for the attack is not limited at all:
“ Notably, using BitLocker with a Trusted Platform Module (TPM) sometimes makes it less secure, allowing an attacker to gain access to the data even if the machine is stolen while it is completely powered off.
MORE INFO: CLICK HERE
Infolinks In Text Ads
Search Now
Need Translete
Blog Archive
Labels
Add Url
(1)
Affiliate
(4)
Aplikasi Mobile
(1)
Bisnis Gratis Facebook
(1)
Bisnis Internet di Rumah
(3)
Bisnis Online
(1)
Blogging
(8)
Cara membuat Webiste
(1)
Cryptography
(5)
Cyber
(4)
Domain
(5)
E-ECOMMERCE
(4)
E-PAYMENT
(4)
Facebook
(3)
Forex
(1)
Fraud | Confidence tricks | Deception
(2)
Free Credits cards.
(1)
Free Domain
(1)
Free Hosting
(1)
Free Money Online
(3)
Free Submit Url
(1)
Free Website Builder
(1)
free wigdets
(2)
Game Facebook
(1)
google adword
(1)
Google Analytics
(1)
Hack
(2)
Handphone
(4)
Hosting
(3)
Internet
(17)
Jaringan
(1)
jaringan nirkabel
(4)
Komputer
(2)
Make Money Online
(1)
Marketing
(1)
Marketplace
(1)
Mobile
(2)
Modem
(1)
paypal
(10)
PPC
(1)
PTR
(3)
SEO
(5)
Software
(2)
Tips blog
(7)
Tips Domain
(1)
Tips Facebook
(5)
Tips Mempercantik blog
(2)
Tips Mobile
(2)
Tips Twitter
(6)
Torrent
(2)
Trojans
(1)
Tutorial Twitter
(1)
VCC (Virtual Credit Card)
(1)
0 komentar