DocumentCode
3672866
Title
Cold Boot Attacks on DDR2 and DDR3 SDRAM
Author
Simon Lindenlauf; Höfken;Marko Schuba
Author_Institution
Fac. of Electr. Eng. &
fYear
2015
Firstpage
287
Lastpage
292
Abstract
Cold boot attacks provide a means to obtain a dump of a computer´s volatile memory even if the machine is locked. Such a dump can be used to reconstruct hard disk encryption keys and get access to the content of Bit locker or True crypt encrypted drives. This is even possible, if the obtained dump contains errors. Cold boot attacks have been demonstrated successfully on DDR1 and DDR2 SDRAM. They have also been tried on DDR3 SDRAM using various types of equipment but all attempts have failed so far. In this paper we describe a different hardware setup which turns out to work for DDR3 SDRAM as well. Using this setup it will be possible for digital forensic investigators to recover keys from newer machines that use DDR3 SDRAM.
Keywords
"SDRAM","Error analysis","Temperature measurement","Universal Serial Bus","Encryption","Digital forensics"
Publisher
ieee
Conference_Titel
Availability, Reliability and Security (ARES), 2015 10th International Conference on
Type
conf
DOI
10.1109/ARES.2015.28
Filename
7299928
Link To Document