冷启动攻击
在密码学中,冷启动攻击(在程度较轻时称平台重置攻击)是一种旁路攻击,具有计算机物理访问权限的攻击者能够在使用冷启动重新启动计算机后从运行的操作系统中检索加密密钥[1][2]。攻击依赖于DRAM和SRAM的数据残留特性检索断电后数秒至数分钟内内存中的可读内容[2][3]。
来源
- Halderman, J. Alex; Schoen, Seth; Heninger, Nadia; Clarkson, William; Paul, William; Calandrino, Joseph A; Feldman, Ariel J.; Appelbaum, Jacob; Felten, Edward W. . Princeton University. 2008-02-21 [2008-02-22]. (原始内容存档于2011-09-14).
- MacIver, Douglas. (PDF). HITBSecConf2006, Malaysia: Microsoft. 2006-09-21 [2008-09-23]. (原始内容 (PDF)存档于2006-10-29).
- Skorobogatov, Sergei. . University of Cambridge, Computer Laboratory. June 2002 [2008-02-27]. (原始内容存档于2018-04-21).
外部链接
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.