Security Through Amnesia: A Software-Based Solution to the Cold Boot Attack on Disk Encryption

@inproceedings{Simmons2011SecurityTA,
  title={Security Through Amnesia: A Software-Based Solution to the Cold Boot Attack on Disk Encryption},
  author={Patrick Simmons},
  booktitle={ACSAC},
  year={2011}
}
Disk encryption has become an important security measure for a multitude of clients, including governments, corporations, activists, security-conscious professionals, and privacy-conscious individuals. Unfortunately, recent research has discovered an effective side channel attack against any disk mounted by a running machine [23]. This attack, known as the cold boot attack, is effective against any mounted volume using state-of-the-art disk encryption, is relatively simple to perform for an… CONTINUE READING
Highly Cited
This paper has 76 citations. REVIEW CITATIONS
Recent Discussions
This paper has been referenced on Twitter 1 time over the past 90 days. VIEW TWEETS
48 Citations
3 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 48 extracted citations

77 Citations

01020'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 77 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-3 of 3 references

Tresor: Tresor runs encryption securely outside ram

  • Tilo Müller, Andreas Dewald, Felix C. Freiling
  • In USENIX Security Symposium
  • 2011
Highly Influential
4 Excerpts

Programming a flash-based msp430 using a JTAG interface. http://www.softbaugh.com/downloads/slaa149.pdf

  • Zack Albus Markus Koesler, Franz Graf
  • 2002
Highly Influential
11 Excerpts

Seth D

  • J. Alex Halderman
  • Schoen, Nadia Heninger, William Clarkson, William…
  • 2008
Highly Influential
3 Excerpts

Similar Papers

Loading similar papers…