Главная
Study mode:
on
1
Intro
2
Agenda
3
DDR DRAM
4
DDR2 and DDR3
5
Refresh times
6
Retention times
7
Warm reboot
8
Cold boot attack
9
Why are we doing this
10
Hard disk encryption
11
Last We Remember
12
Schuba Muller 2013 paper
13
Changing the picture
14
Limitations
15
Experiments
16
Research
17
Motherboards used
18
Multichannel
19
Procedure
20
Preparation
21
Creative Ideas
22
First Experiment
23
Short Video
24
Cooling
25
MSRAMDAM
26
Results
27
DDR2 Results
28
DDR3 Results
29
Temperature Results
30
Temperature Results with longer disconnecting time
31
Error patterns
32
What can you do
33
Power on selftest
34
Password protect
35
Conclusion
36
How will you take it out
37
What is the image
38
Read the paper first
39
How to mitigate
Description:
Explore cold boot attacks on DDR2 and DDR3 RAM in this 34-minute conference talk from nullcon Goa 2015. Dive into the remanence effect of DRAM, allowing data access even after power loss. Learn about experimental results, including bit error rates and memory block patterns. Discover how these attacks can recover hard disk encryption keys from locked computers. Examine the differences between DDR2 and DDR3 vulnerabilities, and understand the impact of cooling techniques. Investigate various DRAM types and manufacturers, focusing on the ASUS Notebook P53E. Analyze error patterns, temperature effects, and disconnecting times. Gain insights into potential mitigation strategies, including power-on self-tests and password protection. Understand the implications for computer security and the importance of proper data protection measures.

Cold Boot Attack on DDR2 and DDR3 RAM

nullcon
Add to list
0:00 / 0:00