Thursday, March 26, 2009

Cold-boot attacks: The 'frozen cache' approach

Developing a countermeasure for cold-boot attacks
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Blue Coat
rule

Blue Coat Control is Yours.
Blue Coat provides a market-leading Application Delivery Network Infrastructure that optimizes and secures the flow of information to any user, anywhere, on any network. You'll now have something only Blue Coat can offer, business intelligence and control.

rule

Spotlight Story
Cold-boot attacks: The 'frozen cache' approach

M. E. Kabay By M. E. Kabay
Part one of this pair of columns described "cold boot attacks" and their security implications, in particular for software-implemented full-disk encryption. Security expert Jurgen Pabel continues with part two. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Cold-boot attacks change the data leakage landscape Until 2008, the consensus had been that there would be no practical way to remove a RAM chip from a computer system without losing all contained data. However, last July, researchers published a paper about something quite amazing: most RAM chips maintain their data for several seconds without any power, thus allowing a channel for data leakage from any computer to which an attacker has physical access.

Two-factor credit-card safety for online transactions My friend and colleague Jurgen Pabel was one of our first graduates from the Norwich University Master of Science in Information Assurance. He is an active participant in our alumni discussion group and a frequent and welcome correspondent. Here, I present his latest suggestions (entirely his with minor edits and additions).

Icy encryption tool protects laptops from "cold boot" attack, vendor says The vendor HyBlue says it can prevent the "cold boot" encryption hack discovered by Princeton researchers.

'Cold Boot' encryption hack unlikely, says Microsoft Users can keep thieves from stealing encrypted data by changing some settings in Windows, a Microsoft product manager said as he downplayed the threat posed by new research that shows how attackers can inspect a "ghost ...

Cold Boot Attack put to test After researchers at Princeton University showed how they could dig up the contents of a computer's memory just minutes after the machine had been turned off using a "Cold Boot", it was only a matter of time before hackers began testing the technique.

Cold bits as a security bypass Columnist Scott Bradner discusses how worried you should really be about a new disk-encryption bypass exposed by Princeton security researchers.

Rogue SharePoint sites pose security menace Gartner estimates that 30% of SharePoint servers are rogue deployments, launched by business managers without the IT department's knowledge.

Podcast: Lessons Learned 10 Years After Melissa Virus The virus named after an exotic dancer on March 26, 1999, helped kick off a bunch of high-profile threats that changed the security and IT world rapidly. On the eve of the 10th anniversary of the virus, Keith Shaw talks with Symantec's Kevin Haley about lessons that security vendors, IT and end users have learned about viruses and worms over the past decade. (8:13)

Compass Award Winners: Security Leadership In Trying Times These are trying times. To say budgets are tight would be a severe understatement when, in fact, many businesses are struggling simply to survive in this economy. Current conditions make it even harder for security, which in so many companies is still seen as an unfortunate expense mandated by government regulations.
Compass Awards: Robert Rodriguez
Cancilla: Security Must Put Business First
Pethia: InfoSec's Challenges, Changes
Fleury: Insider Threat is the 'Weakest Link'

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Blue Coat
rule

Blue Coat Control is Yours.
Blue Coat provides a market-leading Application Delivery Network Infrastructure that optimizes and secures the flow of information to any user, anywhere, on any network. You'll now have something only Blue Coat can offer, business intelligence and control.

rule

Case Study: Successful LAN Support
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.


What you need to see all 7 layers
Get all the tools you need to see all 7 layers of your network. Fluke's OptiView Analyzer combines protocol analysis, active discovery, and device and traffic analysis in a mobile solution, giving you the information you need to control your network and minimize disruption.
Click here for your free trial.

 

03/26/09

Today's most-read stories:

  1. CEO payday: How much tech chiefs made in '08
  2. Melissa virus turning 10 ... (age of the stripper unknown)
  3. Hidden commands
  4. Linux penguin mascot gives way to Tuz
  5. What is Nortel up to?
  6. 10 great free sites and downloads
  7. Eight great free security tools
  8. Strike looms for AT&T
  9. Microsoft to present open source blueprint for down economy
  10. Microsoft again delays identity management server
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment