Cold Boot Attacks on Disk Encryption

看板Bugtraq作者時間16年前 (2008/02/23 00:25), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
This project has been in the works since the last CCC Camp in 2007. We're all pretty excited to release it and so I thought Bugtraq readers might have some thoughts on the matter. Ed Felten wrote about it on Freedom To Tinker this morning: http://www.freedom-to-tinker.com/?p=1257 "Today eight colleagues and I are releasing a significant new research result. We show that disk encryption, the standard approach to protecting sensitive data on laptops, can be defeated by relatively simple methods. We demonstrate our methods by using them to defeat three popular disk encryption products: BitLocker, which comes with Windows Vista; FileVault, which comes with MacOS X; and dm-crypt, which is used with Linux. The research team includes J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten." "Our site has links to the paper, an explanatory video, and other materials." "The root of the problem lies in an unexpected property of today旧 DRAM memories. DRAMs are the main memory chips used to store data while the system is running. Virtually everybody, including experts, will tell you that DRAM contents are lost when you turn off the power. But this isn急 so. Our research shows that data in DRAM actually fades out gradually over a period of seconds to minutes, enabling an attacker to read the full contents of memory by cutting power and then rebooting into a malicious operating system." Our full paper with videos and photos can be found on the Princeton website: http://citp.princeton.edu/memory/ Regards, Jacob Appelbaum
文章代碼(AID): #17llTa00 (Bugtraq)