LINUX.ORG.RU

История изменений

Исправление ivlad, (текущая версия) :

Кто прав?

Не стоит сравнивать качество статьи CNET 2018 года c отчётом об оригинальном исследовании FAU, ссылка на которое приведена на superuser. Там сказано:

Elevating the attack to currently used DDR3 RAM however failed, and we were not able to accomplish any attack more advanced than the basic warm reset attack on DDR3 RAM (which can be prevented with a simple BIOS boot lock). Admittedly, it is too early to promote DDR3 as the ultimate countermeasure against cold boot attacks, and further experiments are required in future. For example, it stays unclear whether the DDR3 construction type alone renders the remanence effect unobservable, presumably due to very short remanence times caused by the lower voltage used, the higher integration density and the resulting lower charges in the RAM cells, or if the DDR3 memory controller plays a role as well. If the latter is the case, specialized DDR3 controllers on an attacker’s machine could re-enable cold boot attacks again.

От этого и стоит отталкиваться.

Исправление ivlad, :

Кто прав?

Не стоит сравнивать качество статьи CNET 2018 года c хотчётом об оригинальном исследовании FAUъ(https://faui1-files.cs.fau.de/filepool/projects/coldboot/fares_coldboot.pdf), ссылка на которое приведена на superuser. Там сказано:

Elevating the attack to currently used DDR3 RAM however failed, and we were not able to accomplish any attack more advanced than the basic warm reset attack on DDR3 RAM (which can be prevented with a simple BIOS boot lock). Admittedly, it is too early to promote DDR3 as the ultimate countermeasure against cold boot attacks, and further experiments are required in future. For example, it stays unclear whether the DDR3 construction type alone renders the remanence effect unobservable, presumably due to very short remanence times caused by the lower voltage used, the higher integration density and the resulting lower charges in the RAM cells, or if the DDR3 memory controller plays a role as well. If the latter is the case, specialized DDR3 controllers on an attacker’s machine could re-enable cold boot attacks again.

От этого и стоит отталкиваться.

Исходная версия ivlad, :

Кто прав?

Не стоит сравнивать качество статьи CNET 2018 года c отчётом об оригинальном исследовании FAU, ссылка на которое приведена на superuser. Там сказано:

Elevating the attack to currently used DDR3 RAM however failed, and we were not able to accomplish any attack more advanced than the basic warm reset attack on DDR3 RAM (which can be prevented with a simple BIOS boot lock). Admittedly, it is too early to promote DDR3 as the ultimate countermeasure against cold boot attacks, and further experiments are required in future. For example, it stays unclear whether the DDR3 construction type alone renders the remanence effect unobservable, presumably due to very short remanence times caused by the lower voltage used, the higher integration density and the resulting lower charges in the RAM cells, or if the DDR3 memory controller plays a role as well. If the latter is the case, specialized DDR3 controllers on an attacker’s machine could re-enable cold boot attacks again.

От этого и стоит отталкиваться.