Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/156099
Title: Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory
Authors: Won, Yoo-Seung
Bhasin, Shvam
Keywords: Engineering::Computer science and engineering::Data::Data storage representations
Issue Date: 2021
Source: Won, Y. & Bhasin, S. (2021). Are cold boot attacks still feasible : a case study on Raspberry Pi with stacked memory. 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 56-60. https://dx.doi.org/10.1109/FDTC53659.2021.00017
Project: NRF2018NCR-NCR009-0001 
metadata.dc.contributor.conference: 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)
Abstract: Cold boot attacks are semi-invasive attacks which have threatened computer systems over a decade now to leak sensitive user information passwords, keys and PIN. With internet of things (IoT) finding mass deployment, their security must be well investigated. In this work, we take a look at popular IoT device Raspberry Pi (model B+), which is already deployed in millions. Raspberry Pi features a stacked memory on top of its processor, making it impossible to physically separate the RAM from the processor. We investigate the decay model of a cold boot attack on Raspberry Pi. The results show a decay rate as low as 0.00027\% which is orders of magnitude lower than previous works allowing close to perfect data recovery. We further report successful recovery of secret disk encryption key when using dm-crypt on Raspberry Pi followed by discussion on mitigation strategies.
URI: https://hdl.handle.net/10356/156099
ISBN: 978-1-6654-3673-1
DOI: 10.1109/FDTC53659.2021.00017
Research Centres: Temasek Laboratories @ NTU 
Rights: © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/FDTC53659.2021.00017.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:TL Conference Papers

Files in This Item:
File Description SizeFormat 
_2021_FDTC__Cold_Boot_Attack.pdfFDTC 20212.83 MBAdobe PDFThumbnail
View/Open

Page view(s)

71
Updated on May 31, 2023

Download(s) 50

56
Updated on May 31, 2023

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.