tech-crypto archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: cold boot attacks on cgd?



> Even if [a BIOS scrub-on-boot bit] is set, there's no defense against
> someone chilling the RAM, removing it from your machine, and putting
> it into their own.

An attacker who can chill your RAM while it's powered up (or within
moments of power-down) can just clip a leech onto it and read stuff
straight off the pins without needing to power it down at all; the only
way chilling it makes it any easier is that the hardware required is
less sophisticated.

Memory and system design could help defeat this by providing a "power
is going away" signal at least one full refresh cycle before power
really does go away (AIUI most power supplies are, or easily could be
made, capable of this); that last refresh cycle could scrub instead of
refresh.  Then make the case very difficult ("impossible") to open
without pulling power.  (This won't help against the constant-data
memory effect attack, but there are other ways to address that.)

/~\ The ASCII                           der Mouse
\ / Ribbon Campaign
 X  Against HTML               mouse%rodents.montreal.qc.ca@localhost
/ \ Email!           7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B


Home | Main Index | Thread Index | Old Index