Back to Results
First PageMeta Content
BitLocker Drive Encryption / FileVault / Cold boot attack / Advanced Encryption Standard / TrueCrypt / Dynamic random-access memory / Data remanence / Computer memory / Key / Cryptography / Disk encryption / Cryptographic software


Lest We Remember: Cold-Boot Attacks on Encryption Keys
Add to Reading List

Document Date: 2014-12-24 15:14:38


Open Document

File Size: 3,13 MB

Share Result on Facebook

City

Lincoln / /

Company

William Paul (wpaul@windriver.com) Wind River Systems / the AES / Dell / IBM / Hitachi / R.B. Hardware / Toshiba / CBC / Intel / Microsoft / /

Currency

USD / /

/

Event

Reorganization / /

Facility

Chaos Communication Camp / University of Michigan / Princeton University / University of Cambridge Computer Laborary Technical Report / S. Building / /

IndustryTerm

cryptographic software / software module / secure systems / long-term software / Web The / disk encryption systems / memory extraction tool / open-source disk encryption systems / similar products / resistant software / rudimentary start-up / memory extraction tools / disk encryption software ships / disk encryption algorithm / memory extraction software / disk encryption software / computing / memory chips / test systems / flash device / automated demonstration attack tool / semiconductor devices / disk encryption products / encryption products / search heuristics / error correction algorithm / brute force search / secure key management / manufacturing variations / encryption algorithm / /

OperatingSystem

Windows Vista / Windows 7 / Microsoft Windows / Mac OS X / Linux / Macintosh / /

Organization

University of Michigan / Princeton University / USENIX Association / Department of Homeland Security Scholarship and Fellowship Program / Electronic Frontier Foundation / National Science Foundation / Congress / /

Person

Sam Taylor / Ralf-Philipp Weinmann / Colder / Benjamin Mako Hill / Seth D. Schoen / N.J.A. Sloane / Gregory Sutter / Dan Good / Bill Zeller / Chris Palmer / Scott Karlin / Tim Newsham / Peter Gutmann / Jesse Burns / Jacob Appelbaum / William Paul / Joseph A. Calandrino / Ariel J. Feldman / Laura Felten / Nadia Heninger / Kragen Sitaker / Audrey Penven / David Molnar / Christian Fromme / David Robinson / David Hulton / William Clarkson / Another / Andrew Appel / Edward W. Felten / J. Alex Halderman / /

Position

second memory extractor / custom driver / representative / memory controller / storage driver / disk controller / filter driver / disk driver / controller / /

Product

BitLocker disk encryption system / a fully automated demonstration attack tool called BitUnlocker / BitLocker / BitUnlocker / /

ProgrammingLanguage

K / /

ProvinceOrState

Michigan / /

PublishedMedium

Cryptology ePrint Archive / /

Technology

Hard-to-break encryption / RAM / following algorithm / Linux / disk encryption / secret key / operating system / error correction algorithm / Encryption / BitLocker encryption algorithm / encryption system / antivirus software / flash / crossover cable / semiconductor devices / VPN / private key / transplantation / SSL / Operating Systems / memory chips / disk encryption algorithm / Ethernet / D. Penetration testing Windows Vista BitLocker drive encryption / public key / bulk data encryption / SDRAM / DRAM chips / /

URL

http /

SocialTag