首页> 外文会议>USENIX Security Symposium >Lest We Remember: Cold Boot Attacks on Encryption Keys
【24h】

Lest We Remember: Cold Boot Attacks on Encryption Keys

机译:唯恐我们记住:对加密密钥的冷启动攻击

获取原文

摘要

Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount successful attacks on popular disk encryption systems using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple cooling techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.
机译:与流行的假设相反,大多数现代计算机中使用的DRAM断电后,即使在室温下,甚至从主板上卸下,其内容也会保留几秒钟。尽管DRAM在不刷新时变得不太可靠,但它们不会立即被擦除,并且其内容足以持久保留,以便恶意(或取证)获取可用的全系统内存映像。我们表明,这种现象限制了操作系统保护具有物理访问权限的攻击者无法使用加密密钥材料的能力。我们使用冷重启来在没有特殊设备或材料的情况下对流行的磁盘加密系统进行成功的攻击。我们实验性地描述了内存剩余的程度和可预测性,并报告说,使用简单的冷却技术可以大大增加剩余时间。我们提供了新的算法,用于在内存图像中查找加密密钥并纠正由位衰减引起的错误。尽管我们讨论了部分缓解这些风险的几种策略,但我们知道没有简单的补救方法可以消除这些风险。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号