{"id":160,"date":"2008-02-22T02:15:14","date_gmt":"2008-02-22T10:15:14","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/02\/22\/cold-boot-attacks-on-disk-encryption\/"},"modified":"2008-02-22T02:15:14","modified_gmt":"2008-02-22T10:15:14","slug":"cold-boot-attacks-on-disk-encryption","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/22\/cold-boot-attacks-on-disk-encryption\/","title":{"rendered":"Cold Boot Attacks on Disk Encryption"},"content":{"rendered":"<p>Well-known security researcher and commentator Ed Felton and colleagues at Princeton report on a technique for breaking many whole-disk encryption schemes, including the most common ones. The attack is based upon scanning RAM for encryption keys, and is even (reported to be) effective on a machine that has been recently powered down.<\/p>\n<p><!--more-->The <a href=\"http:\/\/citp.princeton.edu\/memory\/\">paper site<\/a> offers a five-minute video and the most recent version of the 22-page paper.<\/p>\n<p>As I understand the results, hibernation may be the friend of expediency, but it is surely no friend of data security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Well-known security researcher and commentator Ed Felton and colleagues at Princeton report on a technique for breaking many whole-disk encryption schemes, including the most common ones. The attack is based upon scanning RAM for encryption keys, and is even (reported &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/22\/cold-boot-attacks-on-disk-encryption\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-160","post","type-post","status-publish","format-standard","hentry","category-physicalsecurity"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=160"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/160\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}