Good article and I think you are doing some very interesting research.<p>My problem with this type of research though is the amount of fear, uncertainty and doubt (FUD) it generates. Your attacks are viable if certain very precise conditions are in place i.e.:<p>[+] device has not been shut down for a period of time(you can probably advice what that is)
[+] the attacker knows and cares enough to try a cold boot attack and recover keys from the DRAM, and doesn't have any other easier options available to them to get the data
[+] they are able to take the memory out and store it in ultracool conditions
[+] the user has not applied another level of encryption on top for really sensitive files e.g. PGP file / email encryption<p>I mean if I was the US, Chinese, Russian governments or organized crime and wanted something on someone's laptop I would just kidnap them or hold their family hostage and ask for the password. Although Truecrypt hidden operating system was designed as some mitigation to this type of attack