[cap-talk] Cold Boot Attacks on Encryption Keys

Ivan Krstić krstic at solarsail.hcs.harvard.edu
Fri Feb 22 13:47:21 EST 2008

On Feb 22, 2008, at 11:31 AM, Karp, Alan H wrote:
> All bets are off if the memory chips are moved to a machine made by  
> a competitor :)

One of the main contributions of this attack is to demonstrate that an  
off-the-shelf can of improvised coolant ("air duster") is sufficient  
to extend the data remanence effects for so long that it presents no  
practical problem to unplug the RAM and move it to a different  
computer. Possible solutions include using a laptop like the MacBook  
Air whose DRAM chips are soldered to the motherboard, or DIYing it by  
covering your laptop's memory in epoxy.

Ivan Krstić <krstic at solarsail.hcs.harvard.edu> | http://radian.org

More information about the cap-talk mailing list