mechanisms employed by an operating system can be bypassed by obtaining physical
access and simply forcing a restart. The key insight that enables this attack is that the
contents of memory on some machines are fully preserved across a warm boot. Upon a
reboot, BootJacker uses this residual memory state to revive the original host operating
system environment and run malicious payloads. Using BootJacker, an attacker can break …