Speakers | |
---|---|
Carl-Daniel Hailfinger | |
Schedule | |
Day | Sunday |
Room | Lameere |
Capacity | 500 |
Start time | 14:00 |
End time | 14:30 |
Duration | 00:30 |
Info | |
Track | Embedded devroom |
Cold boot attacks on RAM readout
Ways to circumvent most known protection methods, and ways to protect the RAM contents even for unmodified operating systems
RAM readout attacks are a nice way to recover encryption keys etc... from computers which are still running, but where you lack proper access rights. The same applies to recently powered off computers. This works by cutting power to the computer and moving the RAM to another special machine which is able to read out RAM modules without overwriting anything. Both new attack vectors and defense mechanisms will be discussed.
New attack: Various hardware-based mitigation schemes have been discussed in literature, but most of them can be circumvented easily with a new method presented in this talk.
Better Defense: Unmodified operating systems offer no way to safeguard RAM contents on regular shutdown, and even modified OS often have to keep some parts of RAM unaltered to allow regular poweroff. A way to ensure RAM clearing on poweroff for unmodified x86 OS will be demonstrated, and its safety and impact will be discussed.
Concurrent events:
Next (up to 3) talks in the same room (Lameere):
When | Event | Track |
---|---|---|
14:30-15:00 | Really fast x86 boot | Embedded |
15:00-16:00 | Enlightenment Foundation Libraries - for developing shiny, fast, and light applications on embedded targets. | Embedded |
16:00-17:00 | Creating secure web based user interfaces for Embedded Devices | Embedded |