"frozen Cache" Method To Thwart Cold Boot Attacks

Recommended Posts

"Frozen cache" method to thwart cold boot attacks

Jan 20 2009

"ACME Security has described a way to neutralise cold boot attacks. Such attacks exploit the fact that data in the DRAM are not immediately lost when power is removed, but remain there for a period that may last from a few seconds to a minute, or even longer if cooling is in use. This makes it possible for a hacker to discover decryption keys, such as those used in Vista's Bitlocker, dm-crypt in Linux, Apple's FileVault, or the open-source TrueCrypt.

The suggested remedy to ward off such cold boot attacks is to move the key into the CPU cache and then prevent further changes to the cache being copied into backing RAM. To do this, the cache has to be switched into a special mode, which is why it's called the "frozen cache" method. A cache-as-RAM method is not in fact new, for LinuxBIOS/CoreBoot already use itfile-pdf.gif in order to have memory space while the memory controller is being initialised. Whatever the case, the method is supposed to prevent the key being successfully extracted from RAM, while the CPU cache itself is made inaccessible."

Heise Security for further details: http://www.heise-online.co.uk/security/Fro...s--/news/112450

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.