PodParley PodParley

Advanced memory forensics: The Cold Boot Attacks (25c3)

Recovering keys and other secrets after power off

An episode of the Chaos Computer Club - 25C3: nothing to hide (ogg) podcast, hosted by Jacob Appelbaum, titled "Advanced memory forensics: The Cold Boot Attacks (25c3)" was published on December 27, 2008 and runs 58 minutes.

December 27, 2008 ·58m · Chaos Computer Club - 25C3: nothing to hide (ogg)

0:00 / 0:00

Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2922.en.html

Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. about this event: http://events.ccc.de/congress/2008/Fahrplan/events/2922.en.html
URL copied to clipboard!