Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/156099
Title: | Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory | Authors: | Won, Yoo-Seung Bhasin, Shvam |
Keywords: | Engineering::Computer science and engineering::Data::Data storage representations | Issue Date: | 2021 | Source: | Won, Y. & Bhasin, S. (2021). Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory. 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 56-60. https://dx.doi.org/10.1109/FDTC53659.2021.00017 | Project: | NRF2018NCR-NCR009-0001 | metadata.dc.contributor.conference: | 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC) | Abstract: | Cold boot attacks are semi-invasive attacks which have threatened computer systems over a decade now to leak sensitive user information passwords, keys and PIN. With internet of things (IoT) finding mass deployment, their security must be well investigated. In this work, we take a look at popular IoT device Raspberry Pi (model B+), which is already deployed in millions. Raspberry Pi features a stacked memory on top of its processor, making it impossible to physically separate the RAM from the processor. We investigate the decay model of a cold boot attack on Raspberry Pi. The results show a decay rate as low as 0.00027\% which is orders of magnitude lower than previous works allowing close to perfect data recovery. We further report successful recovery of secret disk encryption key when using dm-crypt on Raspberry Pi followed by discussion on mitigation strategies. | URI: | https://hdl.handle.net/10356/156099 | ISBN: | 978-1-6654-3673-1 | DOI: | 10.1109/FDTC53659.2021.00017 | Research Centres: | Temasek Laboratories @ NTU | Rights: | © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/FDTC53659.2021.00017. | Fulltext Permission: | open | Fulltext Availability: | With Fulltext |
Appears in Collections: | TL Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
_2021_FDTC__Cold_Boot_Attack.pdf | FDTC 2021 | 2.83 MB | Adobe PDF | ![]() View/Open |
Page view(s)
71
Updated on May 31, 2023
Download(s) 50
56
Updated on May 31, 2023
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.