2015 10th International Conference on Availability, Reliability and Security 2015
DOI: 10.1109/ares.2015.28
|View full text |Cite
|
Sign up to set email alerts
|

Cold Boot Attacks on DDR2 and DDR3 SDRAM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…A cold boot attack is a physical attack on DRAM that involves hot-swapping a DRAM chip and reading out the contents of the DRAM chip on another system [17,52,57,65,91,96,104,107,143,160,170]. The attacker first disables power to the computer containing the victim DRAM and then transfers the DRAM to another system that can read its content.…”
Section: Preventing Cold Boot Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…A cold boot attack is a physical attack on DRAM that involves hot-swapping a DRAM chip and reading out the contents of the DRAM chip on another system [17,52,57,65,91,96,104,107,143,160,170]. The attacker first disables power to the computer containing the victim DRAM and then transfers the DRAM to another system that can read its content.…”
Section: Preventing Cold Boot Attacksmentioning
confidence: 99%
“…Second, we propose a new CODIC-based mechanism to prevent Cold Boot Attacks [17,52,57,65,91,96,104,107,143,160,170]. In a Cold Boot Attack, the attacker physically removes the DRAM module from the victim system and places it in a system under their control to extract secret information.…”
Section: Introductionmentioning
confidence: 99%
“…Apart from these architectural challenges, the DRAM presents a substantial physical attack surface, allowing passive [5,39,60] and active [50] attacks to infer or tamper with secret data stored in memory. To isolate data from physical attacks and ensure its integrity, encrypting and authenticating the DRAM is necessary.…”
Section: Memory Encryptionmentioning
confidence: 99%
“…Anything outside the SoC is untrusted. In particular, the attacker can tamper with the DRAM and mount bus probing or cold-boot attacks [60]. SERVAS effectively removes CPU components involved in the page mapping and address translation from the TCB: unlike SGX, which needs to store trusted metadata in the EPCM [21], SERVAS avoids having an EPCM, thus slightly decreasing the TCB complexity of our SoC.…”
Section: Threat Modelmentioning
confidence: 99%
“…Note that we executed both attacks at a temperature of approximately 20 • C. The results improve when cooling down the phone and its memory modules, as described in [1,10,37].…”
Section: Decay Based On the Cold Boot Attackmentioning
confidence: 99%