Hidden in snow, revealed in thaw: Cold boot attacks revisited

نویسنده

  • Jos Wetzels
چکیده

In this paper, we will provide an overview of the current state-of-theart with regards to so-called cold boot attacks, their practical applicability and feasibility, potential counter-measures and their effectiveness.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cold Boot Attacks in the Discrete Logarithm Setting

In a cold boot attack a cryptosystem is compromised by analysing a noisy version of its internal state. For instance, if a computer is rebooted the memory contents are rarely fully reset; instead, after the reboot an adversary might recover a noisy image of the old memory contents and use it as a stepping stone for reconstructing secret keys. While such attacks were known for a long time, they ...

متن کامل

Bounded Memory Leakage 1 Preliminaries 1.1 Notation 1.2 Leftover Hash Lemma

When designing cryptographic schemes, we usually rely on the assumption that every bit of the secret key is secret. However, in practice, loss of secrecy can happen due to side-channel attacks. For example, an adversary can get secret information using timing attacks, acoustic attacks, or even by getting access to parts of the memory used by a cryptographic protocol such as in the “cold-boot at...

متن کامل

A Composed Microwave Emission Model for Cold Land

The passive microwave remote sensing is widely used in the monitoring of ground surfaces environments on cold land. Many of key parameters, such as snow water equivalent, snow depth, freeze-thaw status, and phase changed water, can be obtained by this technology, which plays an important role in the meteorological, hydrological and global changes studies. However, the accuracy and applicability...

متن کامل

On the Use of Error Detecting and Correcting Codes to Boost Security in Caches against Side Channel Attacks

Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory remanence is exploited to download its content after the microprocessor has been struck by a hard boot. If just in this moment, a crypto-algorithm was in execution, the memory data can be downloaded into a backup memory and specialized tools can be used to extract the secret keys. In the main memory data ca...

متن کامل

Error-Tolerant Algebraic Side-Channel Attacks Using BEE

Algebraic side-channel attacks are a type of side-channel analysis which can recover the secret information with a small number of samples (e.g., power traces). However, this type of side-channel analysis is sensitive to measurement errors which may make the attacks fail. In this paper, we propose a new method of algebraic side-channel attacks which considers noisy leakages as integers restrict...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1408.0725  شماره 

صفحات  -

تاریخ انتشار 2014