Data remanence
Top View
- Let's Remember: Cold Boot Attacks on Encryption Keys
- Sedas: a Self-Destructing Data System Based on Active Storage
- A Guide to Understanding Data Remanence in Automated Information Systems
- Data Persistence on Phones and Computers
- Fundamentals of Storage Media Sanitation
- Reliably Erasing Data from Flash-Based Solid State Drives
- Australian Government Information Security Manual
- Data Remanence in Semiconductor Devices
- Security of Hard Disk Encryption
- Data Remanence: Secure Deletion of Data in Ssds
- Analysis of Data Remanence After Factory Reset, and Sophisticated Attacks on Memory Chips
- Attacks & Analysis of Openssl AES Crypto Material from Memory Dumps
- Protecting Data on Smartphones and Tablets from Memory Attacks
- Attacking and Defending Emerging Computer Systems Using the Memory Remanence Effect
- Encrypting Stored Data
- Lest We Remember: Cold-Boot Attacks on Encryption Keys by J
- Media Sanitization Guide Tom Olzak CISSP November 2019