首页> 外文期刊>Communications of the ACM >Lest We Remember: Cold-Boot Attacks on Encryption Keys
【24h】

Lest We Remember: Cold-Boot Attacks on Encryption Keys

机译:免得我们记住:对加密密钥的冷启动攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, retains its contents for several seconds after power is lost, even at room temperature and even if removed from a motherboard. Although DRAM becomes less reliable when it is not refreshed, it is not immediately erased, and its contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access to a machine. It poses a particular threat to laptop users who rely on disk encryption: we demonstrate that it could be used to compromise several popular disk encryption products without the need for any special devices or materials. We experimentally characterize the extent and predictability of memory retention and report that rema-nence times can be increased dramatically with simple cooling techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for mitigating these risks, we know of no simple remedy that would eliminate them.
机译:与普遍的假设相反,大多数现代计算机中的主内存动态RAM(DRAM)在断电后即使在室温下甚至从主板上卸下后,其内容也会保留几秒钟。尽管DRAM在不刷新时变得不太可靠,但它不会立即被擦除,并且其内容足以持久保留,以便恶意(或取证)获取可用的全系统内存映像。我们表明,这种现象限制了操作系统通过对计算机的物理访问来保护加密密钥材料免受攻击者攻击的能力。它对依赖磁盘加密的笔记本电脑用户构成了特殊的威胁:我们证明了它可以用于破坏几种流行的磁盘加密产品,而无需任何特殊的设备或材料。我们实验性地描述了内存保留的程度和可预测性,并报告说,通过简单的冷却技术,可以大大增加重新使用时间。我们提供了新的算法,用于在内存图像中查找加密密钥并纠正由位衰减引起的错误。尽管我们讨论了缓解这些风险的几种策略,但我们知道没有简单的补救方法可以消除这些风险。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号