[cap-talk] Cold Boot Attacks on Encryption Keys
devbox at selnet.org
Fri Feb 22 18:27:44 EST 2008
On 22/02/2008, at 13.47, Ivan KrstiÄ wrote:
>This encoded message has been converted to an attachment.
>On Feb 22, 2008, at 11:31 AM, Karp, Alan H wrote:
> All bets are off if
>the memory chips are moved to a machine made by
> a competitor :)
>of the main contributions of this attack is to demonstrate that an
off-the-shelf can of improvised coolant ("air duster") is sufficient
>extend the data remanence effects for so long that it presents no
practical problem to unplug the RAM and move it to a different
computer. Possible solutions include using a laptop like the MacBook
Air whose DRAM chips are soldered to the motherboard, or DIYing it by
covering your laptop's memory in epoxy.
This blocks heat dissipation. Expect your RAM to live short.
More information about the cap-talk