The Cold Boot Attack
When it comes to recovering encryption keys from memory nobody has a more intriguing method than Princeton University researchers. We explore a method known as the "Cold Boot Attack". Plus, a clever DirectX injecting UI widget for your PC games that means the end of ALT+Tab.
When it comes to recovering encryption keys from memory nobody has a more intriguing method than Princeton University researchers who pioneered what is known as the Cold Boot Attack.
Their paper, Lest We Remember: Cold Boot Attacks on Encryption Keys debunks the popular assumption that RAM modules lose their contents when power is lost. As it turns out the degredation of memory can be a matter of seconds to minutes at room temperature. Furthermore this degredation can be slowed by freezing the memory module.
The researchers go on to outline several methods for copying memory from a reset computer or extracted RAM module. Princeton University's Center for Information Technology Policy site maintains the paper, videos, and source code from the research.
After laying the ground work for this attack I'll be back in studio next week with more in depth demos and answers to your questions. Please send your feedback and questions along to email@example.com.
PlayXPert is a unique in-game overlay for PC and MMO games, incorporating the popular use of social media and the web with the importance of impressive FPS and un-distubed gameplay. PlayXPert lets you play your game without ever having to Alt-Tab out of the game by downloading the small widgets and customizing your opacity, widget settings, and key bindings. You can see it for yourself at their site: PlayXPert.