• computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access...
    38 KB (4,273 words) - 07:48, 8 May 2025
  • Reboot (redirect from Cold boot)
    power during a cold reboot; therefore, components such as RAM that require power lose the data they hold. However, in a cold boot attack, special configurations...
    16 KB (1,790 words) - 02:20, 6 December 2024
  • Thumbnail for Edward Felten
    Felten and his students were part of the team that discovered the cold boot attack, which allows someone with physical access to a computer to bypass...
    24 KB (2,436 words) - 12:24, 31 March 2025
  • Thumbnail for VeraCrypt
    algorithms may be able to recover the keys. This method, known as a cold boot attack (which would apply in particular to a notebook computer obtained while...
    37 KB (3,218 words) - 10:14, 10 December 2024
  • TRESOR (category Side-channel attacks)
    patch which provides encryption using only the CPU to defend against cold boot attacks on computer systems by performing encryption inside CPU registers...
    10 KB (1,300 words) - 20:28, 28 December 2022
  • read after supposedly having been deleted. (e.g. Cold boot attack) Software-initiated fault attacks — Currently a rare class of side channels, Row hammer...
    31 KB (3,618 words) - 07:13, 16 February 2025
  • vulnerable to a cold boot attack, as it allows a powered-down machine to be booted by an attacker. It is also vulnerable to a sniffing attack, as the volume...
    37 KB (3,534 words) - 03:51, 24 April 2025
  • Thumbnail for Dynamic random-access memory
    Encryption, and Apple's FileVault. This type of attack against a computer is often called a cold boot attack. Dynamic memory, by definition, requires periodic...
    92 KB (11,073 words) - 13:52, 5 April 2025
  • Thumbnail for Evil maid attack
    program builds upon TPM-based secure boot and further attempts to authenticate the device to the user. Cold boot attack Shoulder surfing (computer security)...
    15 KB (1,715 words) - 21:03, 18 October 2024
  • boot password or a key on a removable USB device be used.: 12  TRESOR is a kernel patch for Linux specifically intended to prevent cold boot attacks on...
    34 KB (4,031 words) - 13:43, 24 April 2025
  • Thumbnail for Encryption
    Cryptosystem Cold boot attack Cryptographic primitive Cryptography standards Cyberspace Electronic Security Act (US) Dictionary attack Disk encryption...
    34 KB (3,645 words) - 17:52, 2 May 2025
  • cooled to low temperature. The study authors were able to demonstrate a cold boot attack to recover cryptographic keys for several popular disk encryption systems...
    9 KB (1,328 words) - 21:23, 5 December 2024
  • 2020-05-15. "Cold boot". "Protect Linux from cold boot attacks with TRESOR | Linuxaria". "Tails - Protection against cold boot attacks". "Thoughts on...
    24 KB (2,933 words) - 17:47, 26 February 2025
  • Thumbnail for Computer security
    radiation, to residual effect on RAM cells which as a consequence make a Cold boot attack possible, to hardware implementation faults that allow for access or...
    220 KB (22,338 words) - 04:12, 9 May 2025
  • prevent this if it is a concern. FireWire security issue Cold boot attack Pin control attack Freddie Witherden (2010-09-07). "Memory Forensics Over the...
    12 KB (1,350 words) - 20:46, 30 April 2025
  • encryption schemes are vulnerable to a cold boot attack, whereby encryption keys can be stolen by cold-booting a machine already running an operating...
    17 KB (2,194 words) - 10:17, 19 March 2025
  • Thumbnail for Trusted Platform Module
    2010. Melissa Michael (8 October 2018). "Episode 14 Reinventing the Cold Boot Attack: Modern Laptop Version" (Podcast). F-Secure Blog. Archived from the...
    79 KB (6,593 words) - 00:12, 7 April 2025
  • detail in Figures 8 and 5 of the US patent 6,963,976. Data remanence Cold boot attack Disk encryption software Disk encryption hardware IEEE P1619, standardization...
    30 KB (3,772 words) - 11:25, 5 December 2024
  • were cooled to low temperature. The study authors were able to use a cold boot attack to recover cryptographic keys for several popular disk encryption systems...
    13 KB (1,538 words) - 15:30, 4 February 2025
  • reflect the physical I/O memory is known as I/O memory illusion. DMA attack Cold boot attack LogicLocker FireWire security issue "Hacking industrial processes...
    8 KB (963 words) - 07:06, 22 June 2024
  • Thumbnail for Tails (operating system)
    Tails (operating system) (category Operating system distributions bootable from read-only media)
    While shutting down, Tails overwrites most of the used RAM to avoid a cold boot attack. In 2014, Das Erste reported that the NSA's XKeyscore surveillance...
    18 KB (1,428 words) - 08:21, 19 April 2025
  • Thumbnail for Computer forensics
    electrical charge in memory cells dissipates slowly. Techniques like the cold boot attack exploit this property. Lower temperatures and higher voltages increase...
    23 KB (2,451 words) - 04:26, 30 April 2025
  • technologies, BitLocker is vulnerable to a cold boot attack, especially where TPM is used as a key protector without a boot PIN being required too. A variety of...
    173 KB (16,926 words) - 19:16, 12 April 2025
  • Password cracking (category Cryptographic attacks)
    taken up by script kiddies. Brute-force attack Cold boot attack Dictionary attack Password strength Smudge attack oclHashcat-lite – advanced password recovery...
    27 KB (3,100 words) - 19:19, 25 April 2025
  • Thumbnail for Secure cryptoprocessor
    especially when implemented without a boot PIN, a cryptoprocessor would not be secure against a cold boot attack if data remanence could be exploited to...
    18 KB (1,960 words) - 21:52, 28 December 2024
  • Thumbnail for Nadia Heninger
    their fading memories and allow their secrets to be recovered via a cold boot attack,[A] for her discovery that weak keys for the RSA cryptosystem are in...
    11 KB (664 words) - 09:41, 19 August 2024
  • used in combination with cold boot attacks to extract key material from computers. In their seminal paper on Key Finding attacks, Shamir and van Someren...
    7 KB (1,123 words) - 14:20, 7 January 2025
  • against cold boot attacks. Encryption keys are held inside the CPU rather than in RAM so that data at rest encryption keys are protected against attacks that...
    7 KB (894 words) - 23:15, 23 March 2025
  • algorithms can intelligently recover the keys. This method, known as a cold boot attack (which would apply in particular to a notebook computer obtained while...
    66 KB (6,514 words) - 12:10, 3 April 2025
  • to servers such as cold boot attacks, hardware advanced persistent threats, rootkits/bootkits, computer hardware supply chain attacks, and physical threats...
    7 KB (630 words) - 08:44, 20 June 2024