Browse > Article

콜드 부트 공격 기술 및 최신 동향 분석  

Won, Yoo-Seung (싱가포르 난양기술대학교 Temasek Labortories)
Han, Dong-Guk (국민대학교 정보보안암호수학과.금융정보보안학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Won, Yoo-Seung, et al. "Practical Cold boot attack on IoT device-Case study on Raspberry Pi." 2020 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA). IEEE, 2020.
2 Kamal, Abdel Alim, and Amr M. Youssef. "Applications of SAT solvers to AES key recov- ery from decayed key schedule images." 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies. IEEE, 2010.
3 Paterson, Kenneth G., Antigoni Polychroniadou, and Dale L. Sibborn. "A coding-theoretic ap- proach to recovering noisy RSA keys." International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2012.
4 Paterson, Kenneth G., and Ricardo Villanueva-Polanco. "Cold boot attacks on NTRU." International Conference on Cryptology in India. Springer, Cham, 2017.
5 Albrecht, Martin R., Amit Deo, and Kenneth G. Paterson. "Cold boot attacks on ring and module lwe keys under the ntt." IACR Transactions on Cryptographic Hardware and Embedded Systems (2018): 173-213.
6 Villanueva-Polanco, Ricardo. "Cold Boot Attacks on LUOV." Applied Sciences 10.12 (2020): 4106.   DOI
7 Villanueva-Polanco, Ricardo. "Cold Boot Attacks on Bliss." International Conference on Cryptology and Information Security in Latin America. Springer, Cham, 2019.
8 Polanco, Ricardo Villanueva. Cold Boot Attacks on Post-Quantum Schemes. Diss. Royal Holloway, University of London, 2019.
9 Villanueva-Polanco, Ricardo, and Eduardo Angulo-Madrid. "Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism." Applied Sciences 11.1 (2021): 193.   DOI
10 Muller, Tilo, Felix C. Freiling, and Andreas Dewald. "TRESOR Runs Encryption Securely Outside RAM." USENIX Security Symposium. Vol. 17. 2011.
11 Gotzfried, Johannes, and Tilo Muller. "ARMORED: CPU-bound encryption for Android-driven ARM devices." 2013 International Conference on Availability, Reliability and Security. IEEE, 2013.
12 Halderman, J. Alex, et al. "Lest we remember: cold-boot attacks on encryption keys." Communications of the ACM 52.5 (2009): 91-98.   DOI
13 Tilo, Muller, Spreitzenbarth Michael, and Felix C. Freiling. "Frost: forensic recovery of scrambled telephones." Proceedings of the International Conference on Applied Cryptography and Network Security. 2014.
14 Bauer, Johannes, Michael Gruhn, and Felix C. Freiling. "Lest we forget: Cold-boot attacks on scrambled DDR3 memory." Digital Investigation 16 (2016): S65-S74.   DOI
15 Yitbarek, Salessawi Ferede, et al. "Cold boot attacks are still hot: Security analysis of memory scramblers in modern processors." 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 2017.