A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
TRESOR-HUNT
2012
Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12
Hard disk encryption is known to be vulnerable to a number of attacks that aim to directly extract cryptographic key material from system memory. Several approaches to preventing this class of attacks have been proposed, including Tresor [18] and LoopAmnesia [25] . The common goal of these systems is to confine the encryption key and encryption process itself to the CPU, such that sensitive key material is never released into system memory where it could be accessed by a DMA attack. In this
doi:10.1145/2420950.2420961
dblp:conf/acsac/BlassR12
fatcat:locmxtd42zg5ta7xnl3vmwqh7i