Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Complete Bibliography of ACM Transactions on Computer Systems
A Complete Bibliography of ACM Transactions on Computer Systems Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 10 August 2021 Version 1.75 Title word cross-reference Accelerating [BJS01]. Accelerator [CZL+15]. Accelerators [LAB+13]. Accent [FR86]. Access [AT83, LZCZ86, LP93, Smi84b, GB01]. arc [GS93]. N [SHG95, Mae85]. Access/Execute [Smi84b]. Accesses [AJ19, HY92, Kel00]. accessing [ACM04]. -Body [SHG95]. accounting [EV03]. accuracy [Jim05]. Accurate [GVM+11, NTW09]. Ace [RR99]. 11/780 [Cla83, CE85]. 1988 [ACM88]. Achieve [LLL+16]. ACM [Jha20]. ACM/SIGOPS [ACM88]. Action [Sch84]. + 2.6 [PTS 14]. 2011 [Mow12]. 2019 [MT20]. Actions [Ree83]. Activations [ABLL92]. active [SJS+00]. Activity 36 [Jha20]. [IRH86, MSB+06]. Ad [BYFK08, FKA10]. Adaptable [AC92]. Adaptation 4 [Jha20]. 432 [CGJ88, CCLP83]. [BS91, AD03, FS04]. Adaptive [ALHH08, AS95, MLS97, CT01]. Address 780 [Cla83, CE85]. [CLFL94, SV99]. Adrenaline [HZL+17]. Affected [IRH86]. Aggregate [AB83]. Abstract [Her86, SS84]. abstraction aggregation [JMB05]. Aggressive [CRL03, Kel00]. Abstractions [SKH+16]. 1 2 [GWSU13]. AI [RDB+21]. Air [CDD96]. al [HKS+83]. Arrays [SHCG94]. Article [Jha20]. Algorithm [Jha20]. Asbestos [VEK+07]. [Bad86, DC85, HBAK86, Lam87, Mae85, Assignments [BGM86]. Assistant Ray89, SK85, Zha91]. Algorithms [HLZ+16]. Assisting [KMG16]. [CM86, GD87, GLM91, KS91, KH92, LA93, Associative [SA95]. Astrolabe [VBV03]. MCS91, San87, Sau83a, Sau83b, TS89, KY04]. Asymmetric [SFKP12]. At-Most-Once allergies [QTZS07]. Allocation [LSW91]. ATC [MT20]. -
Revention of Coldboot Attack on Linux Systems Measures to Prevent Coldboot Attack
Special Issue - 2017 International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 ICIATE - 2017 Conference Proceedings Prevention of Coldboot Attack on Linux Systems Measures to Prevent Coldboot Attack Siddhesh Patil Ekta Patel Nutan Dhange Information Technology, Atharva Information Technology, Atharva Assistant Professor College of Engineering College of Engineering Information Technology, Atharva Mumbai University Mumbai University College of Engineering Mumbai, India Mumbai, India Mumbai University Mumbai, India Abstract— Contrary to the popular belief, DDR type RAM boot attack techniques. We implement measures to ensure that data modules retain stored memory even after power is cut off. stays secure on system shutdown. Data security is critical for most Provided physical access to the cryptosystem, a hacker or a of the business and even home computer users. RAM is used to store forensic specialist can retrieve information stored in the RAM non-persistent information into it. When an application is in use, by installing it on another system and booting from a USB drive user-specific or application-specific data may be stored in RAM. to take a RAM dump. With adequate disassembly and analytic This data can be sensitive information like client information, tools, this information stored in the RAM dump can be payment details, personal files, bank account details, etc. All this deciphered. Hackers thrive on such special-case attack information, if fallen into wrong hands, can be potentially techniques to gain access to systems with sensitive information. dangerous. The goal of most unethical hackers / attackers is to An unencrypted RAM module will contain the decryption key disrupt the services and to steal information. -
CIS 4360 Secure Computer Systems Attacks Against Boot And
CIS 4360 Secure Computer Systems Attacks against Boot and RAM Professor Qiang Zeng Spring 2017 Previous Class • BIOS-MBR: Generation I system boot – What BIOS and MBR are? – How does it boot the system? // Jumping to MBR – How does multi-boot work? // Chain-loading • The limitations of BIOS and MBR – Disk, memory, file system, multi-booting, security, … • UEFI-GPT: Generation II system boot – What UEFI and GPT are? – How does it boot the system? // UEFI boot manager – How does multi-boot work? // separate dirs in ESP CIS 4360 – Secure Computer Systems 2 Limitations of BIOS-MBR • MBR is very limited – Support ~2TB disk only – 4 primary partitions at most (so four OSes at most) – A MBR can store only one boot loader • BIOS is very restrictive – 16-bit processor mode; 1MB memory space (little spare space to accommodate a file system driver) – Blindly executes whatever code on MBR CIS 4360 – Secure Computer Systems 3 UEFI vs. BIOS • Disk partitioning schemes – GPT (GUID Partition Table): part of UEFI spec.; to replace MBR – MBR supports disk size 232 x 512B = 2TB, while UEFI supports much larger disks (264 x 512B = 8,000,000,000 TB) – MBR supports 4 partitions, while GPT supports 128 • Memory space – BIOS: 20-bit addressing; UEFI: 32-bit or 64-bit • Pre-OS environment – BIOS only provides raw disk access, while UEFI supports the FAT file system (so you can use file names to read files) • Booting – BIOS supports boot through boot sectors (MBR and VBR) – UEFI provides a boot partition of hundreds of megabytes (and boot manager and secure boot) CIS 4360 – Secure Computer Systems 4 Previous Class How does dual-boo-ng of Linux and Windows work in UEFI-GPT? Each vendor has a separate directory storing its own boot loader code and configuraon files in the ESP (EFI System Par--on). -
Installation Tips
Installation Tips Important Please Read Before Going Further! Installation of Kitchen Cabinets is NOT a Do-It-Yourself project for those without extensive experience in finish carpentry. If you are not a professional carpenter please seek help from a trained professional. This guide is meant to be used as a supplement to carpenters who are trained and familiar with cabinetry installa- tion techniques, it is not meant to be a stand alone installation guide. Version 1.0 - 2009 CABINET INSTALLATION TABLE OF CONTENTS Cabinet installation requires special skills and tools. If you are COMMON INSTALLATION TOOLS uncertain of any part of these basic instructions, terms or lack the minimum listed tools, consult with your cabinet supplier For professional results have the tools you need at hand and for recommended professional cabinet installation mechanics. ready. Here’s a tip: save changeover time by having two An error during installation can result in costly repairs and cordless screwguns – one with a drill bit for predrilling screw delays. holes and another with a screw tip. TERMS TO KNOW • Power Drill • Sand Paper • Drill Bits • Block Plane • Terms and Tools Level: A horizontal plane at right angles to the plumb. • Carpenter’s Levels (2’ & 4’) • Clamps • Carpenter’s Square • Caulking Plumb: A true vertical line. If something is “out of plumb” it •Tape Measure (1”x25’) • Chalk Line is not exactly straight up and down. • Step ladder • Mitre Box • Common Construction Details • Nail Set • Marking Tools Square: All lines parallel and at 90° to each other. • Extension Cord(s) • Stud Finder Rail: A horizontal framing member of a cabinet door. -
PET Strap Extrusion Line : Our Strapet Extrusion Line Is Nowadays
PET Strap Extrusion Line : Our StraPET extrusion line is nowadays the best solution for PET plastic strap producers. The key of StraPET extrusion line success is based on reliability of the extrusion process guarantying the highest efficiency level in term of production capacity and quality of the final product i.e. PET strap. StraPETextrusIon line offered by MICRO is suitable for making straps from 100% PET bottle flakes or 100% recycled PET strap grinder with dedicated parameters and accessories set to suit quality straps. StraPET extrusion range for different models from 2 line machine to 8 line machine is designed perfectly by considering the customers exact requirement. It's extrusion capacity varies from 1,400 tons per year (200 kg./hr.) to 6,000 tons per year (750 kg./hr.) All models are capable to produce all the strap sizes requested by the market from 9mm to 32mm respecting the most restricted standard of quality for dimensions, weight, breaking load and elongation. Continuous innovation at MICRO is driven by Internal research on top performances solution due to know how on final product and methodologies to treat It and cooperation with the main players in plastic industries for plastic materials or additives improvement and new technologies available like raw material melting, filtering, recycling, stretching, annealing, winding etc. MICRO make StraPET extrusion line is designed, assembled and checked in house from our engineer team to meet customer expectation and trust. Application: When it comes to PET strapping solution, we offer reliable and unbeatable strapping plant which Is now remarkable presence in various Industries across the nation. -
Food Packaging Technology
FOOD PACKAGING TECHNOLOGY Edited by RICHARD COLES Consultant in Food Packaging, London DEREK MCDOWELL Head of Supply and Packaging Division Loughry College, Northern Ireland and MARK J. KIRWAN Consultant in Packaging Technology London Blackwell Publishing © 2003 by Blackwell Publishing Ltd Trademark Notice: Product or corporate names may be trademarks or registered Editorial Offices: trademarks, and are used only for identification 9600 Garsington Road, Oxford OX4 2DQ and explanation, without intent to infringe. Tel: +44 (0) 1865 776868 108 Cowley Road, Oxford OX4 1JF, UK First published 2003 Tel: +44 (0) 1865 791100 Blackwell Munksgaard, 1 Rosenørns Allè, Library of Congress Cataloging in P.O. Box 227, DK-1502 Copenhagen V, Publication Data Denmark A catalog record for this title is available Tel: +45 77 33 33 33 from the Library of Congress Blackwell Publishing Asia Pty Ltd, 550 Swanston Street, Carlton South, British Library Cataloguing in Victoria 3053, Australia Publication Data Tel: +61 (0)3 9347 0300 A catalogue record for this title is available Blackwell Publishing, 10 rue Casimir from the British Library Delavigne, 75006 Paris, France ISBN 1–84127–221–3 Tel: +33 1 53 10 33 10 Originated as Sheffield Academic Press Published in the USA and Canada (only) by Set in 10.5/12pt Times CRC Press LLC by Integra Software Services Pvt Ltd, 2000 Corporate Blvd., N.W. Pondicherry, India Boca Raton, FL 33431, USA Printed and bound in Great Britain, Orders from the USA and Canada (only) to using acid-free paper by CRC Press LLC MPG Books Ltd, Bodmin, Cornwall USA and Canada only: For further information on ISBN 0–8493–9788–X Blackwell Publishing, visit our website: The right of the Author to be identified as the www.blackwellpublishing.com Author of this Work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. -
Exterior Finishes
EXTERIOR FINISHES 14.0 EXTERIOR FINISHES 14.1 GENERAL NUDURA’s Integrated Building Technology can be covered with a multitude of different finishes. Exterior finishes must be installed over the EPS in accordance with the building code and local requirements. The exterior finish will protect the EPS from the elements and nature. The contractor must follow the finishes installation guidelines for installation onto the EPS forms. MOST IMPORTANT: All exterior finishes requiring mechanical attachment will require the use of SCREWS in place of any nails that are specified in the manufacturer’s installation instructions. As noted previously in Chapter 9, an area of finishing that needs special attention will be around the openings and the proper installation of rain screens, drip cap flashings, through-wall flashings, sill pans, and air barrier membranes, that prevent moisture from entering in behind the opening and ultimately gaining access to the inside of the building. The exterior finish will determine the type, and method, of rain screen or drip edge membrane. Stucco applications will require the base coat to be wrapped into the window flange before finishing trims are attached. If the finish happens to be a material that is not directly applied to the EPS then light gauge metal kerfed into the EPS along with the NUDURA Peel and Stick Membrane will prevent any moisture from getting to the inside of the wall. These requirements are covered in more complete detail under Chapter 9. However, the contractor should be sure to cross check this data for completion of these details FIGURE 14.01 before ANY exterior finish material is applied. -
Loading of Road Freight Vehicles Covering Technical, Behavioural and Organisational Aspects
Best Practice Guidelines for Safe (Un)Loading of Road Freight Vehicles covering Technical, Behavioural and Organisational Aspects Issue 1 - December 2013 Table of Contents Table of Contents ____________________________________________________________ 2 Introduction ________________________________________________________________ 3 Scope and objectives _________________________________________________________ 3 Part A: Organizational and Behavioural aspects_____________________________________ 4 1. Behaviour Based Safety _________________________________________________ 4 2. Roles and responsibilities ________________________________________________ 9 3. SQAS and ESAD ______________________________________________________ 18 4. Emergency response plan _______________________________________________ 19 5. Applicable legislation ___________________________________________________ 21 6. Communication skills of drivers and operators _______________________________ 22 Part B: Technical aspects _____________________________________________________ 23 7. Technical requirements (un)loading sites ___________________________________ 23 8. SULID: Site (Un)Loading Information Document _____________________________ 24 9. Information, instructions and training for drivers and operators _________________ 26 10. Personal Protective Equipment (PPE) ______________________________________ 30 11. Unloading scenario’s bulk liquid __________________________________________ 33 12. Couplings and hoses for bulk liquids and gasses _____________________________ -
Using Registers As Buffers to Resist Memory Disclosure Attacks Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma To cite this version: Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, et al.. RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks. 31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.293-307, 10.1007/978-3-319-33630-5_20. hal-01369563 HAL Id: hal-01369563 https://hal.inria.fr/hal-01369563 Submitted on 21 Sep 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks Yuan Zhao1;2;3?, Jingqiang Lin1;2, Wuqiong Pan1;2??, Cong Xue1;2;3, Fangyu Zheng1;2;3, and Ziqiang Ma1;2;3 1 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China 2 Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China 3 University of Chinese Academy of Sciences, China {yzhao,linjq,wqpan,cxue13,fyzheng,zqma13}@is.ac.cn Abstract. -
The Dynisco Extrusion Processors Handbook 2Nd Edition
The Dynisco Extrusion Processors Handbook 2nd edition Written by: John Goff and Tony Whelan Edited by: Don DeLaney Acknowledgements We would like to thank the following people for their contributions to this latest edition of the DYNISCO Extrusion Processors Handbook. First of all, we would like to thank John Goff and Tony Whelan who have contributed new material that has been included in this new addition of their original book. In addition, we would like to thank John Herrmann, Jim Reilly, and Joan DeCoste of the DYNISCO Companies and Christine Ronaghan and Gabor Nagy of Davis-Standard for their assistance in editing and publication. For the fig- ures included in this edition, we would like to acknowledge the contributions of Davis- Standard, Inc., Krupp Werner and Pfleiderer, Inc., The DYNISCO Companies, Dr. Harold Giles and Eileen Reilly. CONTENTS SECTION 1: INTRODUCTION TO EXTRUSION Single-Screw Extrusion . .1 Twin-Screw Extrusion . .3 Extrusion Processes . .6 Safety . .11 SECTION 2: MATERIALS AND THEIR FLOW PROPERTIES Polymers and Plastics . .15 Thermoplastic Materials . .19 Viscosity and Viscosity Terms . .25 Flow Properties Measurement . .28 Elastic Effects in Polymer Melts . .30 Die Swell . .30 Melt Fracture . .32 Sharkskin . .34 Frozen-In Orientation . .35 Draw Down . .36 SECTION 3: TESTING Testing and Standards . .37 Material Inspection . .40 Density and Dimensions . .42 Tensile Strength . .44 Flexural Properties . .46 Impact Strength . .47 Hardness and Softness . .48 Thermal Properties . .49 Flammability Testing . .57 Melt Flow Rate . .59 Melt Viscosity . .62 Measurement of Elastic Effects . .64 Chemical Resistance . .66 Electrical Properties . .66 Optical Properties . .68 Material Identification . .70 SECTION 4: THE SCREW AND BARREL SYSTEM Materials Handling . -
Packaging Supplies
PACKAGING SUPPLIES STEEL STRAPPING SAFETY CUTTERS t 4USPOHFTUNBUFSJBMGPSBXJEFSBOHFPGTUSBQQJOHSFRVJSFNFOUT t *EFBMGPSIFBWZTIJQNFOUTUIBUSFRVJSFTUSPOHFS FOR STEEL STRAPPING QSPUFDUJPOPWFSQPMZQSPQZMFOFBOEQPMZFTUFS t #MBDLQBJOUFEBOEXBYFEmOJTIFE STANDARDDUTY t $VUTTUFFMTUSBQQJOHXJEFYUIJDL t 4BGFUZEFTJHOIPMETTUSBQQJOHJOQMBDF UPQSFWFOUJOKVSJFTGSPNnZJOHFOET t 3VCCFSQBETHFOUMZSFMFBTF TUSBQQJOHXIFOCFJOHDVU Model Strap Core Strength Model No. PC446 No. Width" Dimensions" lbs. Coil' PF404 1/2 x 0.020 16 x 3 1200 2940 PF405 5/8 x 0.020 16 x 3 1500 2360 PF406 3/4 x 0.020 16 x 3 1800 1960 HEAVYDUTY PF407 1 1/4 x 0.031 16 x 1 1/4 5500 760 t $VUTTUFFMTUSBQQJOHXJEFYUIJDL t 1PXFSGVMESPQGPSHFETUFFMEFTJHO t )FBWZEVUZQFSGPSNBODFGPS STEEL SEALS JOEVTUSJBMBQQMJDBUJPOT t "MMGVMMZHBMWBOJ[FETUFFM Open Type t MPOH t 0QFO 4OBQPO UZQF Model No. PC479 6TFEPOnBUBOETNPPUITVSGBDFT t 'VMMZDMPTFE QVTI UZQF 6TFEPODVSWFSBOEJSSFHVMBSTVSGBDFT STEEL STRAPPING TENSIONERS Closed Type PUSH BAR STYLE t "DDFQUTTUFFMTUSBQQJOHUIJDL t -JHIUUFOTJPO MJNJUFEUBLFVQ t *EFBMGPSBQQMJDBUJPOTPOTNBMM SPVOEPSJSSFHVMBSTVSGBDFT t 'PSVTFXJUIQVTIUZQFDMPTFETFBMT PA567 Model Strap Qty Model Strap Qty No. Width" /Box No. Width" /Box FEEDWHEEL STYLE OPEN SNAPON FULLY CLOSED PUSH t "DDFQUTTUFFMTUSBQQJOHUIJDL PF408 1/2 2000 PF415 1/2 2000 t 'BTUBOEFBTZPQFSBUJPO PF409 5/8 2000 PF416 5/8 2000 t .FEJVNIFBWZUFOTJPO VOMJNJUFEUBLFVQ PF410 3/4 2000 PF417 3/4 2000 t *EFBMGPSBQQMJDBUJPOTPOnBUTVSGBDFT PF411 1/2 5000 PF418 1/8 5000 t 'PSVTFXJUIPQFOTFBMT PF412 5/8 5000 PF419 5/8 5000 PC938 PE350 PF413 3/4 5000 PF420 -
Lest We Remember: Cold Boot Attacks on Encryption Keys
Lest We Remember: Cold Boot Attacks on Encryption Keys J. Alex Halderman*, Seth D. Schoen†, Nadia Heninger*, William Clarkson, William Paul‡, Joseph A. Calandrino*, Ariel J. Feldman*, Jacob Appelbaum and Edward W. Felten* *Princeton University †Electronic Frontier Foundation ‡Wind River Systems USENIX Security Symposium, 2008 Presented by: Andra-Maria Ilieș Seminar in Computer Architecture 1 Executive summary ■ Problem: DRAMs lose their data gradually after the power is cut ■ Goal: Present a new type of attack which exploits remanence effect ■ Method: ■ Acquire usable full-system memory image ■ Extract cryptographic key ■ Gain access to secret data ■ Evaluation: succeeded on most popular disk encryption systems 2 Background, Problem & Goal 3 DRAM ■ A DRAM cell consists of a capacitor and an access transistor. ■ It stores data in terms of change in the capacitor. wordline access transistor bitline bitline storage bitline capacitor 4 DRAM refresh ■ DRAM capacitor charge leaks over time ■ Each DRAM row is refreshed periodically to restore charge ■ Period usually is 64 ms ■ Retention time: maximum time a cell can go without being refreshed while maintaining its stored data ■ Decay: bit flips caused by charge leak ■ Cell leak = cell decays to ground state ■ When powered off DRAM loses its data completely 5 Retention time and temperature ■ Contents survive at some extent even at room temperature ■ LINK, W., AND MAY, H. Eigenschaften von MOS - Ein Transistorspeicherzellen bei tiefen Temperaturen. Archiv fur Elekotronik und Ubertragungstechnik 33 (June 1979), 229–235 ■ DRAM showed no data loss for a full week without refresh when cooled with liquid nitrogen ■ Retention time can be increased by cooling 6 Retention time and booting ■ Chow, Jim & Pfaff, Ben & Garfinkel, Tal & Rosenblum, Mendel.