tech-crypto archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: cold boot attacks on cgd?
> Even if [a BIOS scrub-on-boot bit] is set, there's no defense against
> someone chilling the RAM, removing it from your machine, and putting
> it into their own.
An attacker who can chill your RAM while it's powered up (or within
moments of power-down) can just clip a leech onto it and read stuff
straight off the pins without needing to power it down at all; the only
way chilling it makes it any easier is that the hardware required is
less sophisticated.
Memory and system design could help defeat this by providing a "power
is going away" signal at least one full refresh cycle before power
really does go away (AIUI most power supplies are, or easily could be
made, capable of this); that last refresh cycle could scrub instead of
refresh. Then make the case very difficult ("impossible") to open
without pulling power. (This won't help against the constant-data
memory effect attack, but there are other ways to address that.)
/~\ The ASCII der Mouse
\ / Ribbon Campaign
X Against HTML mouse%rodents.montreal.qc.ca@localhost
/ \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Home |
Main Index |
Thread Index |
Old Index