TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cryogenically frozen RAM bypasses disk encryption methods (2008)

49 pointsby andreyvitalmost 9 years ago

13 comments

moyixalmost 9 years ago
There has been some more recent work on this lately:<p><a href="https:&#x2F;&#x2F;www.dfrws.org&#x2F;2016eu&#x2F;proceedings&#x2F;DFRWS-EU-2016-7.pdf" rel="nofollow">https:&#x2F;&#x2F;www.dfrws.org&#x2F;2016eu&#x2F;proceedings&#x2F;DFRWS-EU-2016-7.pdf</a><p>Essentially, with newer RAM (DDR3), the location things end up on the physical chip is scrambled to improve reliability:<p>&gt; Storage of bit streams which are strongly biased towards zero or one can lead to a multitude of practical problems: Modification of data within such a biased bit stream can lead to comparatively high peak currents when bits are toggled. These current spikes cause problems in electronic systems such as stronger electromagnetic emission and decreased reliability. In contrast, when streams without DC-bias are used, the current when working with those storage semiconductors is, on average, half of the expected maximum.<p>So once you image the RAM you have to figure out the scrambling and undo it.<p>Related: <a href="https:&#x2F;&#x2F;github.com&#x2F;IAIK&#x2F;DRAMA" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;IAIK&#x2F;DRAMA</a>
评论 #11886633 未加载
nickpsecurityalmost 9 years ago
The problem here was already known before the publication of the paper even though the paper was still a clever attack. Most of security research, including high-assurance software, was largely ignoring attacks on hardware. There was a subfield growing that didn&#x27;t trust the RAM, disk, peripherals, etc. These designs drew a boundary at the ASIC or SOC level where anything tampering outside was protected with crypto, PUF&#x27;s, etc. The first I saw was Aegis:<p><a href="https:&#x2F;&#x2F;people.csail.mit.edu&#x2F;devadas&#x2F;pubs&#x2F;aegis-istr-august6-2005.pdf" rel="nofollow">https:&#x2F;&#x2F;people.csail.mit.edu&#x2F;devadas&#x2F;pubs&#x2F;aegis-istr-august6...</a><p>Joshua Edmison&#x27;s dissertation lists a number of others along with his own, interesting scheme:<p><a href="https:&#x2F;&#x2F;theses.lib.vt.edu&#x2F;theses&#x2F;available&#x2F;etd-10112006-204811&#x2F;unrestricted&#x2F;edmison_joshua_dissertation.pdf" rel="nofollow">https:&#x2F;&#x2F;theses.lib.vt.edu&#x2F;theses&#x2F;available&#x2F;etd-10112006-2048...</a><p>Nobody has learned anything different since for the fundamentals. The fundamentals are still to use authenticated crypto of some sort on RAM to detect attacks there to fail safe at worst. Also, use special IO&#x2F;MMU&#x27;s, SOC mechanisms, and software protected by them to handle stuff on disks. Stopping cold boot attack is straight-forward on such architectures that don&#x27;t trust RAM in the first place.<p>From there, we move into cat and mouse game of SOC attack and defense. Most of those require physical possession for more than a few minutes, though, with often destruction of the chip as a result. So, this is a significant step forward in security vs just snatching the RAM out of the system.
lunixbochsalmost 9 years ago
<a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;TRESOR" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;TRESOR</a><p>OS X has a setting called &quot;destroy FileVault key on standby&quot; in `pmset` which mitigates cold boot attacks.<p>I kinda want the CPU&#x2F;MMU to support loading encryption keys to transparently encrypt some or all of RAM (could also toss in error checking while we&#x27;re at it). SGX has this in the trusted containers, but I think it makes sense for general use too.
评论 #11887520 未加载
Canadaalmost 9 years ago
I heard that when power is interrupted ACPI still has time to inform the system, and not only that, the CPU will continue to execute many, many instructions before it&#x27;s finally deprived of power. The computer seems to turn off instantly to us, but at the time scale the CPU operates at it&#x27;s actually quite a while. I heard this was enough time for an operating system to detect power failure and zero out megabytes of memory.<p>Anyone know if this is true or not?
评论 #11887240 未加载
teddyhalmost 9 years ago
<a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Cold_boot_attack" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Cold_boot_attack</a>
mschuster91almost 9 years ago
There&#x27;s only one solution to prevent this, if you&#x27;re operating a server that might be of federal interest (which might even be running an open proxy or TOR relay):<p>1) Rent an entire rack with a 19&quot; rackmount UPS, as well as locks connected to the server to signal if the rack has been opened, and motion sensors, as well as a compass<p>2) If either the power from outside goes down, or the lock&#x2F;cage alarm triggers, or the motion sensor&#x2F;compass detects motion, wipe the RAM section that contains the HDD encryption keys and power down the machine.<p>Why a compass? Because in case the cops try to move the entire rack carefully (to not trigger a motion sensor with false-alarm filtering), and they rotate the rack, the compass will detect it.
评论 #11887315 未加载
评论 #11887358 未加载
aaron695almost 9 years ago
That&#x27;s nice first.... first time I saw it.<p>Any evidence of it in the wild in the past 8 years, like, you know, actually used once?
评论 #11886582 未加载
评论 #11888767 未加载
评论 #11888738 未加载
ameliusalmost 9 years ago
I have the feeling this could be trivially solved by adding reset lines to the RAM design, and triggering them on shutdown (perhaps powered by some capacitor).
评论 #11889901 未加载
arca_voragoalmost 9 years ago
This has been a known attack vector for quite some time (hence 2008...) One of the best training courses I ever did was a forensics course and this was one of the first techniques taught for a &quot;black bag&quot;, along with faraday cage bags for all the things.<p>I have never gotten to use it irl though.
mirimiralmost 9 years ago
Use Arctic Alumina[0] to fill all USB and Firewire connectors, and embed RAM.<p>[0] <a href="http:&#x2F;&#x2F;www.arcticsilver.com&#x2F;arctic_alumina_thermal_adhesive.htm" rel="nofollow">http:&#x2F;&#x2F;www.arcticsilver.com&#x2F;arctic_alumina_thermal_adhesive....</a>
评论 #11887112 未加载
imjustsayingalmost 9 years ago
So why don&#x27;t OS&#x27;s just zero out the RAM as part of the normal poweroff cycle now?
sandworm101almost 9 years ago
Kickstarter idea: Memory modules with an inbuilt temp sensor. Below 0c, they just stop. Put that tiny circuit into the silicon and the problem goes away.
dec0dedab0dealmost 9 years ago
this research is neat, but was also neat in 2008 when it was released