<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
             

          With cold air, encrypted computer memory vulnerable to hacking

          (Agencies)
          Updated: 2008-02-23 12:43

          SAN FRANCISCO - Want to break into a computer's encrypted hard drive? Just blast the machine's memory chip with a burst of cold air.

          That's the conclusion of new research out of Princeton University demonstrating a novel, low-tech way hackers can access even the most well-protected computers, provided they have physical access to the machines.

          The Princeton report shows how encryption, long considered a vital shield against hacker attacks, can be defeated by manipulating the way memory chips work. The researchers say the ease of their attack raises fears about the security of laptop computers increasingly used to store sensitive information, from personal banking data, to company trade secrets, to national security documents.

          Freezing a dynamic random access memory, or DRAM, chip, the most common type of memory chip in personal computers, causes it to retain data for minutes or even hours after the machine loses power, the report found. That data includes the keys to unlock encryption. Without freezing, the chip loses its contents within seconds.

          Hackers can steal information stored in memory by rebooting the compromised machine with a simple program designed to copy the memory contents before the computer has a chance to purge sensitive data, according to the study.

          Laptops left in hibernation or sleep mode, or simply not turned off at all, are the most vulnerable to the new type of attack.

          "These risks imply that disk encryption on laptops may do less good than widely believed," according to the report, which was published this week by researchers from Princeton, the Electronic Frontier Foundation digital rights group, and Wind River Systems software company. "Ultimately, it might become necessary to treat DRAM as untrusted, and to avoid storing sensitive confidential data there, but this will not be feasible until architectures are changed to give software a safe place to keep its keys."

          Researchers have known since the 1970s that cooled DRAM chips can retain their contents long after power to them is extinguished, but the researchers said they believe their study is the first security paper to focus on the phenomenon. National security agencies may also have been aware that the types of breaches outlined in the study are possible, the researchers said, but added they weren't able to find evidence of that in any publications.

          The attacks were carried out by spraying an upside-down canister of multipurpose duster spray directly onto the memory chips, freezing them to minus 50 degrees Celsius, about minus 60 Fahrenheit.

          One challenge faced by the researchers was the threat that booting the system will automatically overwrite some parts of the memory. To make sure the contents were retained, they used small, special-purpose programs known as memory-imaging tools, which can be loaded over a network connection or a USB device, to save images captured from the memory chip. The attacks even work when the DRAM chip is removed and transferred to a machine set up by the hacker.

          Special programs were then used to correct errors in the recovered memory contents and reconstruct the keys used for encryption.

          The researchers said their results suggest that "this faith in the strength of disk encryption may be misplaced," arguing that a moderately skilled attacker can bypass many widely used encryption products, including BitLocker, included with some versions of Windows Vista; Apple's FileVault; open-source TrueCrypt; and dm-crypt, if a laptop is stolen while it is powered on or suspended.

          "The use of encryption is not, by itself, necessarily an adequate defense, and data in stolen laptops may be compromised even when encryption is used," the researchers said.



          Top World News  
          Today's Top News  
          Most Commented/Read Stories in 48 Hours
          主站蜘蛛池模板: 免费又黄又爽又猛的毛片| 99久久激情国产精品| 草莓视频成人| 91久久亚洲综合精品成人| 亚洲男人在线天堂| 国产精品白浆免费视频| 蜜桃视频在线观看网站免费| 精品国产一区二区三区在线观看| 国产综合久久99久久| 国产成人综合亚洲AV第一页| 无码国内精品久久人妻蜜桃| 中文字幕日本在线免费| 国产三级国产精品久久成人| 亚洲av产在线精品亚洲第一站| 成人福利国产午夜AV免费不卡在线 | 国产欧美日韩精品丝袜高跟鞋 | 最新偷拍一区二区三区| 亚州毛色毛片免费观看| 精品国产成人亚洲午夜福利| 久久亚洲人成网站| 久久人妻精品大屁股一区| 四虎影视一区二区精品| 亚洲天堂激情av在线| 日韩在线欧美在线| 国产综合有码无码中文字幕| 另类欧美日韩| 日韩精品一区二区三区激| 99在线小视频| 久久热这里只有精品66| 久久99精品国产麻豆婷婷| 亚洲中文字字幕精品乱码| 99久久精品国产一区二区暴力| 亚洲精品中文字幕二区| 丝袜人妖av在线一区二区| 免费国产好深啊好涨好硬视频| 老司机久久99久久精品播放免费| 韩国18禁啪啪无遮挡免费| 日韩中文字幕人妻一区| 亚洲一卡2卡3卡4卡 精品| 日韩精品有码中文字幕| 国产女高清在线看免费观看|