[Orcnet] Cold Boot attacks on RAM

Keith Lofstrom keithl at kl-ic.com
Fri Feb 22 05:41:31 UTC 2008


Not directly related to Orcnet, but interesting electronics anyway.

DRAM typically retains data images for much longer than a typical
refresh interval.  This paper describes cold boot attacks that
can read RAMs and extract encryption keys for minutes or even hours
after shutdown.  

http://citp.princeton.edu/memory/

BTW, the reason most DRAM cells can store bits for so long is that
the pass transistors of the cells are designed to work at the extreme
outliers of power supply, temperature, process spread, and device
mismatch, and in the presence of small leakage defects.  So 99.99999%
of the cells are overdesigned, so the one in a trillion transistor
that is excessively leaky won't kill an otherwise good part.

Keith

-- 
Keith Lofstrom          keithl at keithl.com         Voice (503)-520-1993
KLIC --- Keith Lofstrom Integrated Circuits --- "Your Ideas in Silicon"
Design Contracting in Bipolar and CMOS - Analog, Digital, and Scan ICs


More information about the Orcnet mailing list