Software Solution: Against Cold Boot Attack

نویسندگان

  • Abhishek Kaushik
  • Sudhanshu Naithani
چکیده

DRAM is an important memory of a computer. Microprocessor loads the data requested by the user into DRAM before processing the data. Hence, DRAM contains important information in a computer. Recently, researchers discovered that DRAM is vulnerable to attack that is called Cold boot attack. DRAM contents can be recovered even after the computer has been powered off for several minutes. The information obtained can be often use to break the disk encryption system such as File vault. In this paper, we proposed the methodology which explains the complete process and describe the safeguard methods. We design a system keeping few things in our mind the accessibility for the user and Security. This System is defines as a software solution to the cold boot problem. We also used additional feature to prevent DRAM from the machine replacement. The System is designed as the procedure to secure the encryption key and prevent the machine from attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysing Android's Full Disk Encryption Feature

Since Android 4.0, which was released in October 2011, users of Android smartphones are provided with a built-in encryption feature to protect their home partitions. In the work at hand, we give a structured analysis of this software-based encryption solution. For example, software-based encryption always requires at least a small part of the disk to remain unencrypted; in Android this is the e...

متن کامل

On the Use of Error Detecting and Correcting Codes to Boost Security in Caches against Side Channel Attacks

Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory remanence is exploited to download its content after the microprocessor has been struck by a hard boot. If just in this moment, a crypto-algorithm was in execution, the memory data can be downloaded into a backup memory and specialized tools can be used to extract the secret keys. In the main memory data ca...

متن کامل

Forensic Recovery of Scrambled Telephones

At the end of 2011, Google released version 4.0 of its Android operating system for smartphones. For the first time, Android smartphone owners were supplied with a disk encryption feature that transparently scrambles user partitions, thus protecting sensitive user information against targeted attacks that bypass screen locks. On the downside, scrambled telephones are a a nightmare for IT forens...

متن کامل

A flexible framework for mobile device forensics based on cold boot attacks

Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is the cold boot attack. The cold boot attack exploits the remanence effect that causes data in DRAM modules not to lose the content immediately in case...

متن کامل

Exzess: Hardware-Based RAM Encryption Against Physical Memory Disclosure

The main memory of today’s computers contains lots of sensitive data, in particular from applications that have been used recently. As data within RAM is stored in cleartext, it is exposed to attackers with physical access to a system. In this paper we introduce Exzess, a hardware-based mitigation against physical memory disclosure attacks such as, for example, cold boot and DMA attacks. Our FP...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014