Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/147144
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWon, Yoo-Seungen_US
dc.contributor.authorPark, Jong-Yeonen_US
dc.contributor.authorHan, Dong-Guken_US
dc.contributor.authorBhasin, Shivamen_US
dc.date.accessioned2021-03-24T01:58:11Z-
dc.date.available2021-03-24T01:58:11Z-
dc.date.issued2020-
dc.identifier.citationWon, Y., Park, J., Han, D. & Bhasin, S. (2020). Practical cold boot attack on IoT device - Case study on Raspberry Pi -. 2020 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits. https://dx.doi.org/10.1109/IPFA49335.2020.9260613en_US
dc.identifier.urihttps://hdl.handle.net/10356/147144-
dc.description.abstractVolatile memory like SDRAM, forms an integral part of any computer system. It stores variety of data including sensitive data like passwords and PIN. The data stored in SDRAM is wiped off on power-off. However, by bringing the RAM to freezing cold temperature before power off, the data can persist for several seconds, allowing recovery through cold boot attacks. In this work, we investigate the vulnerability of IoT device such as Raspberry Pi against cold boot attack for the first time. Our study found that even though the boot sequence is different from laptop, personal computer, and smartphone, we demonstrate that it is still possible to steal the RAM data, even when the bootloader is not public. The net cost of the attack was under 10 dollars and 99.99% of the RAM data was successfully recovered.en_US
dc.description.sponsorshipNational Research Foundation (NRF)en_US
dc.language.isoenen_US
dc.rights© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/IPFA49335.2020.9260613en_US
dc.subjectEngineering::Computer science and engineering::Information systems::Information systems applicationsen_US
dc.titlePractical cold boot attack on IoT device - Case study on Raspberry Pi -en_US
dc.typeConference Paperen
dc.contributor.conference2020 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuitsen_US
dc.contributor.researchTemasek Laboratoriesen_US
dc.identifier.doi10.1109/IPFA49335.2020.9260613-
dc.description.versionAccepted versionen_US
dc.subject.keywordsCold Boot Attacken_US
dc.subject.keywordsIoT Deviceen_US
dc.citation.conferencelocationSingaporeen_US
dc.description.acknowledgementThis research is supported in parts by the National Research Foundation, Singapore, under its National Cybersecurity Research & Development Programme / Cyber- Hardware Forensic & Assurance Evaluation R&D Programme (Award: NRF2018NCR-NCR009-0001).en_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
Appears in Collections:TL Conference Papers
Files in This Item:
File Description SizeFormat 
01_IPFA2020.pdf2.49 MBAdobe PDFThumbnail
View/Open

SCOPUSTM   
Citations 50

6
Updated on May 24, 2023

Page view(s)

286
Updated on Jun 4, 2023

Download(s) 10

382
Updated on Jun 4, 2023

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.