Hidden in snow, revealed in thaw: Cold boot attacks revisited
نویسنده
چکیده
In this paper, we will provide an overview of the current state-of-theart with regards to so-called cold boot attacks, their practical applicability and feasibility, potential counter-measures and their effectiveness.
منابع مشابه
Cold Boot Attacks in the Discrete Logarithm Setting
In a cold boot attack a cryptosystem is compromised by analysing a noisy version of its internal state. For instance, if a computer is rebooted the memory contents are rarely fully reset; instead, after the reboot an adversary might recover a noisy image of the old memory contents and use it as a stepping stone for reconstructing secret keys. While such attacks were known for a long time, they ...
متن کاملBounded Memory Leakage 1 Preliminaries 1.1 Notation 1.2 Leftover Hash Lemma
When designing cryptographic schemes, we usually rely on the assumption that every bit of the secret key is secret. However, in practice, loss of secrecy can happen due to side-channel attacks. For example, an adversary can get secret information using timing attacks, acoustic attacks, or even by getting access to parts of the memory used by a cryptographic protocol such as in the “cold-boot at...
متن کاملA Composed Microwave Emission Model for Cold Land
The passive microwave remote sensing is widely used in the monitoring of ground surfaces environments on cold land. Many of key parameters, such as snow water equivalent, snow depth, freeze-thaw status, and phase changed water, can be obtained by this technology, which plays an important role in the meteorological, hydrological and global changes studies. However, the accuracy and applicability...
متن کاملOn the Use of Error Detecting and Correcting Codes to Boost Security in Caches against Side Channel Attacks
Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory remanence is exploited to download its content after the microprocessor has been struck by a hard boot. If just in this moment, a crypto-algorithm was in execution, the memory data can be downloaded into a backup memory and specialized tools can be used to extract the secret keys. In the main memory data ca...
متن کاملError-Tolerant Algebraic Side-Channel Attacks Using BEE
Algebraic side-channel attacks are a type of side-channel analysis which can recover the secret information with a small number of samples (e.g., power traces). However, this type of side-channel analysis is sensitive to measurement errors which may make the attacks fail. In this paper, we propose a new method of algebraic side-channel attacks which considers noisy leakages as integers restrict...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1408.0725 شماره
صفحات -
تاریخ انتشار 2014