2020 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA) 2020
DOI: 10.1109/ipfa49335.2020.9260613
|View full text |Cite
|
Sign up to set email alerts
|

Practical Cold boot attack on IoT device - Case study on Raspberry Pi -

Abstract: Volatile memory like SDRAM, forms an integral part of any computer system. It stores variety of data including sensitive data like passwords and PIN. The data stored in SDRAM is wiped off on power-off. However, by bringing the RAM to freezing cold temperature before power off, the data can persist for several seconds, allowing recovery through cold boot attacks. In this work, we investigate the vulnerability of IoT device such as Raspberry Pi against cold boot attack for the first time. Our study found that ev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 4 publications
1
8
0
Order By: Relevance
“…Unauthorised access to SRAM data through cold boot attacks can lead to serious security breach in the target system. The practicality of cold boot attacks have been widely demonstrated on platforms like laptop [7], desktop [9], scrambled RAM [10], smartphones [11] and IoT device [12]. Depending on the temperature of the memory, the data stored in memory can potentially retain even though losing the power.…”
Section: A Cold Boot Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…Unauthorised access to SRAM data through cold boot attacks can lead to serious security breach in the target system. The practicality of cold boot attacks have been widely demonstrated on platforms like laptop [7], desktop [9], scrambled RAM [10], smartphones [11] and IoT device [12]. Depending on the temperature of the memory, the data stored in memory can potentially retain even though losing the power.…”
Section: A Cold Boot Attackmentioning
confidence: 99%
“…desktop and laptop), the adversary can remove the victim memory and connect to another machine for recovering the data. If the memory cannot be separated due physical constraints (like stacked memory in chip package), a vulnerable boot sequence can be exploited to recover the sensitive data from cold boot [12]. In this paper, we concentrate on the vulnerability of Raspberry Pi against cold boot attack in order to investigate the ML model recovery.…”
Section: A Cold Boot Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Although the devices used in IoT are low-cost, they do come in complex packaging adopting methods like stacked memory, package on package etc. Won et al [7] presented a first vulnerability investigation of modern IoT devices with stacked memory against cold boot attacks and reported high recovery rate from stacked RAM. While [7] explores the feasibility of cold boot attacks, the work is done in simple setting with no encryption enabled.…”
Section: Introductionmentioning
confidence: 99%
“…Won et al [7] presented a first vulnerability investigation of modern IoT devices with stacked memory against cold boot attacks and reported high recovery rate from stacked RAM. While [7] explores the feasibility of cold boot attacks, the work is done in simple setting with no encryption enabled. In this work, we investigate practical cold boot attacks to recover encryption keys from IoT devices.…”
Section: Introductionmentioning
confidence: 99%