首页> 外文会议>IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits >Practical Cold boot attack on IoT device - Case study on Raspberry Pi -
【24h】

Practical Cold boot attack on IoT device - Case study on Raspberry Pi -

机译:物联网设备的实用冷启动攻击-Raspberry Pi案例研究-

获取原文

摘要

Volatile memory like SDRAM, forms an integral part of any computer system. It stores variety of data including sensitive data like passwords and PIN. The data stored in SDRAM is wiped off on power-off. However, by bringing the RAM to freezing cold temperature before power off, the data can persist for several seconds, allowing recovery through cold boot attacks. In this work, we investigate the vulnerability of IoT device such as Raspberry Pi against cold boot attack for the first time. Our study found that even though the boot sequence is different from laptop, personal computer, and smartphone, we demonstrate that it is still possible to steal the RAM data, even when the bootloader is not public. The net cost of the attack was under 10 dollars and 99.99% of the RAM data was successfully recovered.
机译:像SDRAM这样的易失性存储器构成任何计算机系统的组成部分。它存储各种数据,包括敏感数据,例如密码和PIN。断电时会擦除存储在SDRAM中的数据。但是,通过在关闭电源之前将RAM置于低温状态,数据可以保留几秒钟,从而可以通过冷启动攻击进行恢复。在这项工作中,我们首次调查了Raspberry Pi等IoT设备针对冷启动攻击的漏洞。我们的研究发现,即使引导顺序与笔记本电脑,个人计算机和智能手机不同,我们也证明了,即使引导加载程序不是公开的,仍有可能窃取RAM数据。攻击的净成本不到10美元,并且成功恢复了99.99%的RAM数据。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号