Researchers at Princeton University have found a way around whole disk encryption. Dubbed the “cold-boot attack”, apparently there’s a way to “freeze” the whole disk encryption passphrase while it’s stored in dynamic memory and then extract it using some software they’ve written. Having learned and applied what can be done with/to a PC at the chip level in my assembly language programming days, this comes as no shocker. Wish it would’ve come out when I was helping to write Laptop Encryption For Dummies. 😉
With all the problems associated with laptop insecurities, this type of attack opens up a whole new can of worms. Will this lead to encryption override attacks down the road? It wouldn’t surprise me. A greater focus on hardware hacks? You bet.
Don’t you know the marketing wheels at the encryption solution companies are going full blast right about now!
Man, I love innovation. Good job security for us too…
“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.
His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”