• DocumentCode
    2129797
  • Title

    On the Practicability of Cold Boot Attacks

  • Author

    Gruhn, Michael ; Muller, Tim

  • Author_Institution
    Friedrich-Alexander-Univ., Erlangen-Nurnberg, Germany
  • fYear
    2013
  • fDate
    2-6 Sept. 2013
  • Firstpage
    390
  • Lastpage
    397
  • Abstract
    Even though a target machine uses full disk encryption, cold boot attacks can retrieve unencrypted data from RAM. Cold boot attacks are based on the remanence effect of RAM which says that memory contents do not disappear immediately after power is cut, but that they fade gradually over time. This effect can be exploited by rebooting a running machine, or by transplanting its RAM chips into an analysis machine that reads out what is left in memory. In theory, this kind of attack is known since the 1990s. However, only in 2008, Halderman et al. have shown that cold boot attacks can be well deployed in practical scenarios. In the work in hand, we investigate the practicability of cold boot attacks. We verify the claims by Halderman et al. independently in a systematic fashion. For DDR1 and DDR2, we provide results from our experimental measurements that in large part agree with the original results. However, we also point out that we could not reproduce cold boot attacks against modern DDR3 chips. Our test set comprises 17 systems and system configurations, from which 5 are based on DDR3.
  • Keywords
    cryptography; random-access storage; DDR1; DDR2; DDR3 chips; RAM chips; RAM remanence effect; analysis machine; cold boot attacks; full disk encryption; Cooling; Data mining; Noise; Random access memory; Remanence; Semiconductor device measurement; Temperature measurement; Cold Boot Attack; DDR3; Remanence Effect;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Availability, Reliability and Security (ARES), 2013 Eighth International Conference on
  • Conference_Location
    Regensburg
  • Type

    conf

  • DOI
    10.1109/ARES.2013.52
  • Filename
    6657268