Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cold boot attack

Known as: Full memory encryption, Iceman attack, Platform reset attack 
In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Cryptosystems are essential for computer and communication security, e.g., RSA or ECDSA in PGP Email clients and AES in full disk… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
Cold boot attacks target memory remanence effects in hardware to secret key material. Such attacks were first explored in the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2017
2017
Previous work has demonstrated that systems with unencrypted DRAM interfaces are susceptible to cold boot attacks – where the… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Smartphones and tablets are easily lost or stolen. This makes them susceptible to an inexpensive class of memory attacks, such as… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • table 4
Is this relevant?
2015
2015
In a cold boot attack a cryptosystem is compromised by analysing a noisy version of its internal state. For instance, if a… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Even though a target machine uses full disk encryption, cold boot attacks can retrieve unencrypted data from RAM. Cold boot… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • table II
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Disk encryption has become an important security measure for a multitude of clients, including governments, corporations… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, retains its contents for several… Expand
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2009
2009
Use open-source tools to dump and scan RAM from a target system for encyption keys and other goodies. 
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Abstract Motivated by outstanding issues from a previous case study of a midlatitude cold surge that affected Mexico and Central… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?