æ¥æ 2010å¹´3æ25æ¥(æ¨) 10:00 ï½ 12:00 å ´æ ç¬ç«è¡æ¿æ³äººæ å ±å¦çæ¨é²æ©æ§ (IPA) 13é ä¼è°å®¤A, B (å°å³) å 容 æå·ã¢ã¸ã¥ã¼ã«è©¦é¨ããã³èªè¨¼å¶åº¦(JCMVP)ç´¹ä»ã®ä¸ç°ã¨ãã¦ãæå·ã¢ã¸ã¥ã¼ã«ã®éè¦ãªæ©è½è¦ç´ ã§ãããä¹±æ°çæå¨ã«é¢ããæ¨æºåååããã³æè¡ååãç´¹ä»ããã¨å ±ã«ãä¹±æ°çæå¨ã®å®è£ ã«å¯¾ããè¦æ±äºé ã解説ãã¾ãã ããã°ã©ã æå·ã¢ã¸ã¥ã¼ã«è©¦é¨åã³èªè¨¼å¶åº¦ãæå·ã¢ã«ã´ãªãºã 確èªå¶åº¦ã®ç´¹ä» ä¹±æ°çæå¨ã«é¢ããè¦æ±äºé ã®èª¬æ è¬å¸« IPA ã»ãã¥ãªãã£ã»ã³ã¿ã¼ æ å ±ã»ãã¥ãªãã£èªè¨¼å®¤ æ«»äº çå¼¥ / æ©æ¬ å¾¹ åéäººæ° 40å (å çé ãåé人æ°ãéã¾ã次第ãåä»ãçµäºããã¦ããã ãã¾ãã) 対象è æå·ã¢ã¸ã¥ã¼ã«éçºè åå è²»ç¨ ç¡æ ç³ãè¾¼ã¿æ¹æ³ç é»åã¡ã¼ã«ã§ãååããæå±ããé£çµ¡å ã éçºå¯¾è±¡ã®æå·ã¢ã¸ã¥ã¼ã«ç©çå½¢æ åã¯è£½ååãè¨å ¥ã®ä¸ã次ã®
ãLest We Remember: Cold Boot Attacks on Encryption Keys(æ¦è¦)ãã¨ããçºè¡¨ãããã¾ããã ãFull Research Paperããå ¬éããã¦ãã¾ãã ããªã³ã¹ãã³å¤§å¦ã§ã®ç 究çºè¡¨ã§ãã ä¸ã®ä¸ã«ããé常ã«å¤ãã®ãã¼ããã£ã¹ã¯æå·åã¯çªç ´ã§ããã¨æ¸ãã¦ããã¾ããã RAM(ã¡ã¢ãª)ã«æ®ã£ãç§å¯éµãèªã¿è¾¼ãã§ãã¾ãã°æå·ãè¤åã§ããã¨ããçºæ³ã§ãã é»æºãåãã¨RAMã«å ¥ã£ãæ å ±ã¯ç´ãã«æ¶ãã¦ãã¾ãããã§ã¯ãªããæéã¨å ±ã«å¾ã ã«æ¶ãã¦è¡ãã¾ãã ãã®RAMã«å«ã¾ããæå·ã®ç§å¯éµãèªã¿åºãã¦ãã¾ãã¨ããããã§ãã ãããªãé»æºãåã£ã¦ç´ãã«å·å´æãªã©ã§æ¥éã«å·å´ããã¨ããææ³ã使ãã¨ãRAMãããã¼ã¿ãæ¶å¤±ããã¾ã§ã®æéãé£èºçã«å»¶ã°ãäºãå¯è½ã§ããã¨ç 究ã§ã¯è¿°ã¹ã¦ãã¾ãã ä»åã®ç 究è éã¯TrueCryptãApple FileVau
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}