Mastery Key and RAM burn-in

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi. I've read Gutmann's papers about how data held persistently in DRAM
can cause physical "burn-in" that makes master encryption key recovery
trivial. His suggestion was to makes sure it is re-written/moved around
every few minutes. [1] loop-aes had such a mitigation implemented,
though it unfortunately aids cold boot attack key recovery.[2]

Does dm-crypt have mitigations for this in place?

[1] https://www.cs.jhu.edu/~astubble/600.412/s-c-papers/remanence.pdf

[2] https://www.lorentzcenter.nl/lc/web/2010/383/presentations/Heninger.pdf


_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
https://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux