{TRESOR} Runs Encryption Securely Outside {RAM}

T Müller, FC Freiling, A Dewald - 20th USENIX Security Symposium …, 2011 - usenix.org
Current disk encryption techniques store necessary keys in RAM and are therefore
susceptible to attacks that target volatile memory, such as Firewire and cold boot attacks. We …

Security through amnesia: a software-based solution to the cold boot attack on disk encryption

P Simmons - Proceedings of the 27th Annual Computer Security …, 2011 - dl.acm.org
Disk encryption has become an important security measure for a multitude of clients,
including governments, corporations, activists, security-conscious professionals, and privacy …

TreVisor: OS-independent software-based full disk encryption secure against main memory attacks

T Müller, B Taubmann, FC Freiling - … , ACNS 2012, Singapore, June 26-29 …, 2012 - Springer
Software-based disk encryption techniques store necessary keys in main memory and are
therefore vulnerable to DMA and cold boot attacks which can acquire keys from RAM …

AESSE: a cold-boot resistant implementation of AES

T Müller, A Dewald, FC Freiling - … of the Third European Workshop on …, 2010 - dl.acm.org
Cold boot attacks exploit the fact that memory contents fade with time and that most of them
can be retrieved after a short power-down (reboot). These attacks aim at retrieving …

PRIME: private RSA infrastructure for memory-less encryption

B Garmany, T Müller - Proceedings of the 29th Annual Computer Security …, 2013 - dl.acm.org
Cold boot attacks exploit the fact that data in RAM gradually fades away over time, rather
than being lost immediately when power is cycled off. An attacker can gain access to all …

TRESOR-HUNT: attacking CPU-bound encryption

EO Blass, W Robertson - Proceedings of the 28th Annual Computer …, 2012 - dl.acm.org
Hard disk encryption is known to be vulnerable to a number of attacks that aim to directly
extract cryptographic key material from system memory. Several approaches to preventing …

Memory encryption: A survey of existing techniques

M Henson, S Taylor - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Memory encryption has yet to be used at the core of operating system designs to provide
confidentiality of code and data. As a result, numerous vulnerabilities exist at every level of …

Cryptkeeper: Improving security with encrypted RAM

PAH Peterson - … on Technologies for Homeland Security (HST), 2010 - ieeexplore.ieee.org
Random Access Memory (RAM) was recently shown to be vulnerable to physical attacks
exposing the totality of memory, including user data and encryption keys. We present …

[PDF][PDF] Copker: Computing with Private Keys without RAM.

L Guan, J Lin, B Luo, J Jing - NDSS, 2014 - ndss-symposium.org
Cryptographic systems are essential for computer and communication security, for instance,
RSA is used in PGP Email clients and AES is employed in full disk encryption. In practice …

Memory encryption for general-purpose processors

S Gueron - IEEE Security & Privacy, 2016 - ieeexplore.ieee.org
Intel's Software Guard Extensions allows general-purpose computing platforms to run
software in a trustworthy manner and securely handle encrypted data. To satisfy the …