TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tresor – CPU-only AES implementation resistant to RAM cold-boot attacks (2011)

87 pointsby whitehat2k9over 9 years ago

6 comments

_antaresover 9 years ago
Clever but useless. Cold boot attack does not work on RAM with DDR3+. Pretty much all new computers are safe. <a href="http:&#x2F;&#x2F;superuser.com&#x2F;a&#x2F;464396" rel="nofollow">http:&#x2F;&#x2F;superuser.com&#x2F;a&#x2F;464396</a>
评论 #11025043 未加载
dangover 9 years ago
Previous discussions: <a href="https:&#x2F;&#x2F;hn.algolia.com&#x2F;?query=Tresor%20erlangen%20points%3E10&amp;sort=byDate&amp;dateRange=all&amp;type=story&amp;storyText=false&amp;prefix=false&amp;page=0" rel="nofollow">https:&#x2F;&#x2F;hn.algolia.com&#x2F;?query=Tresor%20erlangen%20points%3E1...</a>
RRRAover 9 years ago
DMA attacks (tb, firewire, etc) also have to be prevented so nobody injects code to pop the registers
dmitrygrover 9 years ago
Pretty clever, but do intel CPUs guarantee that xmm regs are zeroed on boot?
评论 #11023273 未加载
评论 #11023039 未加载
locacortenover 9 years ago
Another implementation using ARM support for cache locking: <a href="http:&#x2F;&#x2F;research.microsoft.com&#x2F;~ssaroiu&#x2F;publications&#x2F;asplos&#x2F;2015&#x2F;sentry.pdf" rel="nofollow">http:&#x2F;&#x2F;research.microsoft.com&#x2F;~ssaroiu&#x2F;publications&#x2F;asplos&#x2F;2...</a>
panamafrankover 9 years ago
Ein wunderschönes Name!