<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
             

          With cold air, encrypted computer memory vulnerable to hacking

          (Agencies)
          Updated: 2008-02-23 12:43

          SAN FRANCISCO - Want to break into a computer's encrypted hard drive? Just blast the machine's memory chip with a burst of cold air.

          That's the conclusion of new research out of Princeton University demonstrating a novel, low-tech way hackers can access even the most well-protected computers, provided they have physical access to the machines.

          The Princeton report shows how encryption, long considered a vital shield against hacker attacks, can be defeated by manipulating the way memory chips work. The researchers say the ease of their attack raises fears about the security of laptop computers increasingly used to store sensitive information, from personal banking data, to company trade secrets, to national security documents.

          Freezing a dynamic random access memory, or DRAM, chip, the most common type of memory chip in personal computers, causes it to retain data for minutes or even hours after the machine loses power, the report found. That data includes the keys to unlock encryption. Without freezing, the chip loses its contents within seconds.

          Hackers can steal information stored in memory by rebooting the compromised machine with a simple program designed to copy the memory contents before the computer has a chance to purge sensitive data, according to the study.

          Laptops left in hibernation or sleep mode, or simply not turned off at all, are the most vulnerable to the new type of attack.

          "These risks imply that disk encryption on laptops may do less good than widely believed," according to the report, which was published this week by researchers from Princeton, the Electronic Frontier Foundation digital rights group, and Wind River Systems software company. "Ultimately, it might become necessary to treat DRAM as untrusted, and to avoid storing sensitive confidential data there, but this will not be feasible until architectures are changed to give software a safe place to keep its keys."

          Researchers have known since the 1970s that cooled DRAM chips can retain their contents long after power to them is extinguished, but the researchers said they believe their study is the first security paper to focus on the phenomenon. National security agencies may also have been aware that the types of breaches outlined in the study are possible, the researchers said, but added they weren't able to find evidence of that in any publications.

          The attacks were carried out by spraying an upside-down canister of multipurpose duster spray directly onto the memory chips, freezing them to minus 50 degrees Celsius, about minus 60 Fahrenheit.

          One challenge faced by the researchers was the threat that booting the system will automatically overwrite some parts of the memory. To make sure the contents were retained, they used small, special-purpose programs known as memory-imaging tools, which can be loaded over a network connection or a USB device, to save images captured from the memory chip. The attacks even work when the DRAM chip is removed and transferred to a machine set up by the hacker.

          Special programs were then used to correct errors in the recovered memory contents and reconstruct the keys used for encryption.

          The researchers said their results suggest that "this faith in the strength of disk encryption may be misplaced," arguing that a moderately skilled attacker can bypass many widely used encryption products, including BitLocker, included with some versions of Windows Vista; Apple's FileVault; open-source TrueCrypt; and dm-crypt, if a laptop is stolen while it is powered on or suspended.

          "The use of encryption is not, by itself, necessarily an adequate defense, and data in stolen laptops may be compromised even when encryption is used," the researchers said.



          Top World News  
          Today's Top News  
          Most Commented/Read Stories in 48 Hours
          主站蜘蛛池模板: julia无码中文字幕一区| 亚洲日本欧美日韩中文字幕| 亚洲欧美人成人综合在线播放| 视频一区二区三区中文字幕狠狠| 欧美精品1区2区| 久久永久视频| 青青操国产| 在线日韩日本国产亚洲| 国产成人精选在线观看不卡| 色哟哟www网站入口成人学校| 又爽又黄又无遮挡的激情视频| 国产精品日韩av一区二区| 亚洲精品国产免费av| 亚洲天堂av日韩精品| 国产精品视频中文字幕| 九九热免费精品视频在线| 久久精品www人人做人人爽| 国产理论片在线观看| 377P欧洲日本亚洲大胆| 人成午夜大片免费视频77777| 国产人妻熟女呻吟在线观看| 亚洲精品国产免费av| 亚洲欧美日韩精品久久| 久久天天躁狠狠躁夜夜2020老熟妇| 久久精品国产自清天天线| 饥渴丰满少妇大力进入| 亚洲 中文 欧美 日韩 在线| 伊人天天久大香线蕉av色| 亚洲av永久无码精品漫画 | 亚洲日韩精品无码av海量| 在线天堂新版资源www在线下载| 亚洲婷婷综合色高清在线| 国产av巨作丝袜秘书| 我趁老师睡觉摸她奶脱她内裤| 亚洲中文久久精品无码照片| 中文国产不卡一区二区| 日韩中文字幕亚洲精品| 国产又黄又爽又色的免费视频| 国模小黎自慰337p人体| 国产精品伊人久久综合网| 97色成人综合网站|