TUCoPS :: HP Unsorted C :: bx2073.htm

Cold Boot Attacks on Disk Encryption
Cold Boot Attacks on Disk Encryption
Cold Boot Attacks on Disk Encryption



This project has been in the works since the last CCC Camp in 2007.
We're all pretty excited to release it and so I thought Bugtraq readers
might have some thoughts on the matter.

Ed Felten wrote about it on Freedom To Tinker this morning:
http://www.freedom-to-tinker.com/?p=1257 

"Today eight colleagues and I are releasing a significant new research
result. We show that disk encryption, the standard approach to
protecting sensitive data on laptops, can be defeated by relatively
simple methods. We demonstrate our methods by using them to defeat three
popular disk encryption products: BitLocker, which comes with Windows
Vista; FileVault, which comes with MacOS X; and dm-crypt, which is used
with Linux. The research team includes J. Alex Halderman, Seth D.
Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A.
Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten."

"Our site has links to the paper, an explanatory video, and other
materials."

"The root of the problem lies in an unexpected property of today=92s DRAM
memories. DRAMs are the main memory chips used to store data while the
system is running. Virtually everybody, including experts, will tell you
that DRAM contents are lost when you turn off the power. But this isn=92t
so. Our research shows that data in DRAM actually fades out gradually
over a period of seconds to minutes, enabling an attacker to read the
full contents of memory by cutting power and then rebooting into a
malicious operating system."

Our full paper with videos and photos can be found on the Princeton
website: http://citp.princeton.edu/memory/ 

Regards,
Jacob Appelbaum

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH