by andreyvit on 6/10/16, 3:05 AM with 34 comments
by moyix on 6/12/16, 3:59 AM
https://www.dfrws.org/2016eu/proceedings/DFRWS-EU-2016-7.pdf
Essentially, with newer RAM (DDR3), the location things end up on the physical chip is scrambled to improve reliability:
> Storage of bit streams which are strongly biased towards zero or one can lead to a multitude of practical problems: Modification of data within such a biased bit stream can lead to comparatively high peak currents when bits are toggled. These current spikes cause problems in electronic systems such as stronger electromagnetic emission and decreased reliability. In contrast, when streams without DC-bias are used, the current when working with those storage semiconductors is, on average, half of the expected maximum.
So once you image the RAM you have to figure out the scrambling and undo it.
Related: https://github.com/IAIK/DRAMA
by nickpsecurity on 6/12/16, 4:15 AM
https://people.csail.mit.edu/devadas/pubs/aegis-istr-august6...
Joshua Edmison's dissertation lists a number of others along with his own, interesting scheme:
https://theses.lib.vt.edu/theses/available/etd-10112006-2048...
Nobody has learned anything different since for the fundamentals. The fundamentals are still to use authenticated crypto of some sort on RAM to detect attacks there to fail safe at worst. Also, use special IO/MMU's, SOC mechanisms, and software protected by them to handle stuff on disks. Stopping cold boot attack is straight-forward on such architectures that don't trust RAM in the first place.
From there, we move into cat and mouse game of SOC attack and defense. Most of those require physical possession for more than a few minutes, though, with often destruction of the chip as a result. So, this is a significant step forward in security vs just snatching the RAM out of the system.
by lunixbochs on 6/12/16, 12:22 AM
OS X has a setting called "destroy FileVault key on standby" in `pmset` which mitigates cold boot attacks.
I kinda want the CPU/MMU to support loading encryption keys to transparently encrypt some or all of RAM (could also toss in error checking while we're at it). SGX has this in the trusted containers, but I think it makes sense for general use too.
by Canada on 6/12/16, 7:33 AM
Anyone know if this is true or not?
by teddyh on 6/12/16, 12:54 AM
by mschuster91 on 6/12/16, 6:50 AM
1) Rent an entire rack with a 19" rackmount UPS, as well as locks connected to the server to signal if the rack has been opened, and motion sensors, as well as a compass
2) If either the power from outside goes down, or the lock/cage alarm triggers, or the motion sensor/compass detects motion, wipe the RAM section that contains the HDD encryption keys and power down the machine.
Why a compass? Because in case the cops try to move the entire rack carefully (to not trigger a motion sensor with false-alarm filtering), and they rotate the rack, the compass will detect it.
by aaron695 on 6/12/16, 3:40 AM
Any evidence of it in the wild in the past 8 years, like, you know, actually used once?
by amelius on 6/12/16, 12:35 PM
by arca_vorago on 6/12/16, 2:30 AM
I have never gotten to use it irl though.
by mirimir on 6/12/16, 5:17 AM
[0] http://www.arcticsilver.com/arctic_alumina_thermal_adhesive....
by imjustsaying on 6/12/16, 9:25 AM
by sandworm101 on 6/12/16, 7:20 AM
by dec0dedab0de on 6/10/16, 5:35 AM