ãLest We Remember: Cold Boot Attacks on Encryption Keys(æ¦è¦)ãã¨ããçºè¡¨ãããã¾ããã ãFull Research Paperããå ¬éããã¦ãã¾ãã ããªã³ã¹ãã³å¤§å¦ã§ã®ç 究çºè¡¨ã§ãã ä¸ã®ä¸ã«ããé常ã«å¤ãã®ãã¼ããã£ã¹ã¯æå·åã¯çªç ´ã§ããã¨æ¸ãã¦ããã¾ããã RAM(ã¡ã¢ãª)ã«æ®ã£ãç§å¯éµãèªã¿è¾¼ãã§ãã¾ãã°æå·ãè¤åã§ããã¨ããçºæ³ã§ãã é»æºãåãã¨RAMã«å ¥ã£ãæ å ±ã¯ç´ãã«æ¶ãã¦ãã¾ãããã§ã¯ãªããæéã¨å ±ã«å¾ã ã«æ¶ãã¦è¡ãã¾ãã ãã®RAMã«å«ã¾ããæå·ã®ç§å¯éµãèªã¿åºãã¦ãã¾ãã¨ããããã§ãã ãããªãé»æºãåã£ã¦ç´ãã«å·å´æãªã©ã§æ¥éã«å·å´ããã¨ããææ³ã使ãã¨ãRAMãããã¼ã¿ãæ¶å¤±ããã¾ã§ã®æéãé£èºçã«å»¶ã°ãäºãå¯è½ã§ããã¨ç 究ã§ã¯è¿°ã¹ã¦ãã¾ãã ä»åã®ç 究è éã¯TrueCryptãApple FileVau
å°å·ãããæ¹ã¯ãã¡ããã覧ãã ããï¼PDFå½¢å¼ã16kãã¤ãï¼ ãã®ãã¥ã¼ã¹ãªãªã¼ã¹è¨è¼ã®æ å ±(製åä¾¡æ ¼ã製åä»æ§ããµã¼ãã¹ã®å 容ãçºå£²æ¥ããåãåããå ãURLç)ã¯ãçºè¡¨æ¥ç¾å¨ã®æ å ±ã§ããäºåãªãã«å¤æ´ãããæ¤ç´¢æ¥ã¨æ å ±ãç°ãªãå¯è½æ§ãããã¾ãã®ã§ãããããããäºæ¿ãã ããããªããææ°ã®ãåãåããå ã¯ããåãåããä¸è¦§ãã覧ä¸ããã 2008å¹´1æ18æ¥ æ ªå¼ä¼ç¤¾æ¥ç«è£½ä½æ å»æ£å¦çéç¨ã«ããããã¼ããã£ã¹ã¯ãã©ã¤ãã®æµåºã«ã¤ãã¦ æ ªå¼ä¼ç¤¾æ¥ç«è£½ä½æ(å·è¡å½¹ç¤¾é·ï¼å¤å·ä¸å¤«)ããæ±äº¬æ¶é²åºããä¾é ¼ãåãã¦ãä¿®ç交æãè¡ããå»æ£ãããã¸ãã¹PC(FLORAã·ãªã¼ãº)ã®ãã¼ããã£ã¹ã¯ãã©ã¤ã(以ä¸ãHDD)ã®ä¸é¨ãããã®å¦çéç¨ã«ããã¦ã誤ã£ã¦ä¸å¤åé販åºã«æµåºãã¦ãããã¨ãã2008å¹´1æ14æ¥ã«å¤æãã¾ãããæµåºããHDDã®ä¸é¨ã«ã¯ãæ±äº¬æ¶é²åºã®ãã¼ã¿ãå«ã¾ãã¦ããã¾ããããåæ¥ãå½è©²
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}