In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine. The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents which remain readable in the seconds to minutes after power has been removed.
Other articles related to "cold boot attack":
... TRESOR was foreshadowed by a 2010 thesis by Tilo Muller which analyzed the cold boot attack issue ... He concluded that modern x86 processors had two register areas where CPU-based kernel encryption was realistic the SSE registers which could in effect be made privileged by disabling all SSE instructions (and necessarily, any programs relying on them), and the debug registers which were much smaller but had no such issues ...
... Felten and his students were part of the team that discovered the cold boot attack, which allows someone with physical access to a computer to bypass operating system ...
Famous quotes containing the words attack, cold and/or boot:
“And whether it is Thursday, or the day is stormy,
With thunder and rain, or the birds attack each other,
We have rolled into another dream.”
—John Ashbery (b. 1927)
“All observations point to the fact that the intellectual woman is masculinized; in her, warm, intuitive knowledge has yielded to cold unproductive thinking.”
—Helene Deutsch (18841982)
“The best quality tea must have creases like the leathern boot of Tartar horsemen, curl like the dewlap of a mighty bullock, unfold like a mist rising out of a ravine, gleam like a lake touched by a zephyr, and be wet and soft like a fine earth newly swept by rain.”
—Lu Yu (d. 804)