Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,237,708 papers from all fields of science
Search
Sign In
Create Free Account
Cold boot attack
Known as:
Full memory encryption
, Iceman attack
, Platform reset attack
In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
BIOS
BitLocker
Booting
Comparison of disk encryption software
Expand
Broader (1)
Disk encryption
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Galaxies in a simulated Lambda CDM Universe-I . Cold mode and hot cores
D. Keres̆
,
N. Katz
,
M. Fardal
,
R. Davé
,
D. Weinberg
2018
Corpus ID: 4538814
We study the formation of galaxies in a large volume (50h Mpc, 2 × 288 particles) cosmological simulation, evolved using the…
Expand
2015
2015
Can we trace very cold dust from its emission alone
L. Pagani
,
C. Lefevre
,
M. Juvela
,
V. Pelkonen
,
F. Schuller
2015
Corpus ID: 118566767
Context. Dust is a good tracer of cold dark clouds but its column density is di cult to quantify. Aims. We want to check whether…
Expand
2014
2014
Software Solution: Against Cold Boot Attack
A. Kaushik
,
Sudhanshu Naithani
2014
Corpus ID: 43126994
— DRAM is an important memory of a computer. Microprocessor loads the data requested by the user into DRAM before processing the…
Expand
2013
2013
FPGA-accelerated key search for cold-boot attacks against AES
Heinrich Riebler
,
Tobias Kenter
,
Christoph Sorge
,
Christian Plessl
International Conference on Field-Programmable…
2013
Corpus ID: 14357828
Cold-boot attacks exploit the fact that DRAM contents are not immediately lost when a PC is powered off. Instead the contents…
Expand
Review
2012
Review
2012
CONSTRAINING JET PRODUCTION SCENARIOS BY STUDIES OF NARROW-LINE RADIO GALAXIES
M. Sikora
,
G. Stasi'nska
,
D. Kozieł-Wierzbowska
,
G. Madejski
,
N. V. Asari
2012
Corpus ID: 31354734
We study a large sample of narrow-line radio galaxies (NLRGs) with extended radio structures. Using 1.4 GHz radio luminosities L1…
Expand
2010
2010
Using a software exploit to image RAM on an embedded system
Joseph R. Rabaiotti
,
C. Hargreaves
Digital Investigation. The International Journal…
2010
Corpus ID: 14123744
2009
2009
Cold boot attack tools for Linux
Kyle Rankin
2009
Corpus ID: 60449706
Use open-source tools to dump and scan RAM from a target system for encyption keys and other goodies.
2009
2009
À propos d'un cas d'infection due à Mycobacterium ulcerans se présentant sous la forme d'un abcès froid
K. Kassi
,
K. Kouamé
,
+4 authors
J. Kanga
2009
Corpus ID: 70968416
: Buruli ulcer is still a public health problem in Cote d'Ivoire. Its physiopathology is poorly described and suggests a new…
Expand
2004
2004
Cold collisions involving rotationally hot oxygen molecules
K. Tilford
,
M. Hoster
,
P. Florian
,
R. C. Forrey
2004
Corpus ID: 54812257
Cold and ultracold collisions involving rotationally hot oxygen molecules are investigated using quantum-mechanical, coupled…
Expand
Review
2001
Review
2001
The clustering of hot and cold IRAS galaxies: the redshift-space correlation function
E. Hawkins
,
S. Maddox
,
E. Branchini
,
W. Saunders
2001
Corpus ID: 16327413
We measure the autocorrelation function, ξ, of galaxies in the IRAS Point Source Catalogue galaxy redshift (PSCz) survey and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE