Lec02a - COMP7370 Advanced Computer and Network Security...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
COMP7370 Advanced Computer and Network Security Cold Boot Attacks on Encryption Keys A memory remanence attack aims to obtain memory images and recover cryptographic keys from DRAM after a reset or moving the DRAM to another system. 1. Motivation: How to attack encrypted disks? Obtain memory images (step 0) Identifying keys in memory (step 1, but we need step 0) Attack encrypted disks using reconstructed keys (step 3) 2. Overview Characterizing Remanence Effects Imaging Residual Memory Key Reconstruction Identifying Keys in Memory Attacking Encrypted Disks 3. DRAM Remanence Effects Computer’s memory is erased almost immediately when it loses power. Is this true? Ordinary DRAMs typically lose their contents gradually over a period of seconds Why do DRAMs lose their contents? o DRAM cell is essentially a capacitor . o Over time charge will leak and cell will lose its state o To forestall this, cell must be refreshed o Standard refresh time is order of ms
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

Lec02a - COMP7370 Advanced Computer and Network Security...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online