ãLest We Remember: Cold Boot Attacks on Encryption Keys(æ¦è¦)ãã¨ããçºè¡¨ãããã¾ããã ãFull Research Paperããå ¬éããã¦ãã¾ãã ããªã³ã¹ãã³å¤§å¦ã§ã®ç 究çºè¡¨ã§ãã ä¸ã®ä¸ã«ããé常ã«å¤ãã®ãã¼ããã£ã¹ã¯æå·åã¯çªç ´ã§ããã¨æ¸ãã¦ããã¾ããã RAM(ã¡ã¢ãª)ã«æ®ã£ãç§å¯éµãèªã¿è¾¼ãã§ãã¾ãã°æå·ãè¤åã§ããã¨ããçºæ³ã§ãã é»æºãåãã¨RAMã«å ¥ã£ãæ å ±ã¯ç´ãã«æ¶ãã¦ãã¾ãããã§ã¯ãªããæéã¨å ±ã«å¾ã ã«æ¶ãã¦è¡ãã¾ãã ãã®RAMã«å«ã¾ããæå·ã®ç§å¯éµãèªã¿åºãã¦ãã¾ãã¨ããããã§ãã ãããªãé»æºãåã£ã¦ç´ãã«å·å´æãªã©ã§æ¥éã«å·å´ããã¨ããææ³ã使ãã¨ãRAMãããã¼ã¿ãæ¶å¤±ããã¾ã§ã®æéãé£èºçã«å»¶ã°ãäºãå¯è½ã§ããã¨ç 究ã§ã¯è¿°ã¹ã¦ãã¾ãã ä»åã®ç 究è éã¯TrueCryptãApple FileVau
{{#tags}}- {{label}}
{{/tags}}