{"id":122,"date":"2008-07-21T14:32:04","date_gmt":"2008-07-21T12:32:04","guid":{"rendered":"http:\/\/blog.robinward.com\/?p=122"},"modified":"2013-08-15T15:18:05","modified_gmt":"2013-08-15T14:18:05","slug":"source-code-for-cold-boot-crypto-key-attack-released","status":"publish","type":"post","link":"https:\/\/robinward.com\/?p=122","title":{"rendered":"Source code for cold boot crypto key attack released"},"content":{"rendered":"<p>You may remember the paper released by a princeton research group regarding cold boot attacks on notebook computers in order to recover crypto keys. <a href=\"http:\/\/robinward.com\/?p=96\" target=\"_blank\">click to view old blog entry <\/a><\/p>\n<p>The princeton research group has now released the sourcecode of a tool which will be able to recover the key, providing that the key is still stored in the DRAM. This can be achieved by severly cooling down the DRAMS temperature.<\/p>\n<p><a href=\"http:\/\/citp.princeton.edu\/memory\/\" target=\"_blank\">Project Overview<\/a><\/p>\n<p><a href=\"http:\/\/citp.princeton.edu\/pub\/coldboot.pdf\" target=\"_blank\">Link to Research Paper<\/a><\/p>\n<p><a href=\"http:\/\/citp.princeton.edu\/memory\/media\" target=\"_blank\">some Media on the project <\/a><\/p>\n<p>Turning off pxe or overall network boot may get you some valuable time, but its probably best too look out for ninjas who are carrying major cooling devices. Apparently they look something like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.nectec.or.th\/users\/htk\/mo\/mk2\/sub_in.gif\" width=\"104\" height=\"119\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may remember the paper released by a princeton research group regarding cold boot attacks on notebook computers in order to recover crypto keys. click to view old blog entry The princeton research group has now released the sourcecode of a tool which will be able to recover the key, providing that the key is &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/robinward.com\/?p=122\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Source code for cold boot crypto key attack released&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-122","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/posts\/122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/robinward.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=122"}],"version-history":[{"count":1,"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/posts\/122\/revisions"}],"predecessor-version":[{"id":750,"href":"https:\/\/robinward.com\/index.php?rest_route=\/wp\/v2\/posts\/122\/revisions\/750"}],"wp:attachment":[{"href":"https:\/\/robinward.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/robinward.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/robinward.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}