trawling through a back log of RSS feeds, this interesting little nuget was found on gnucitizen about a side attack for social engineering. Using a pki database you can query for email addresses tied to certain keys. the author, pdp, has some demo code up but it appears to not be working. However it is a really neat idea.
http://www.gnucitizen.org/projects/pki-book/
We feel passionate about most things related to computer security: Links, news, articles, research papers, etc...
Showing posts with label sideattack. Show all posts
Showing posts with label sideattack. Show all posts
Monday, 3 March 2008
Friday, 22 February 2008
Cold Hacking: what we leave behind
It seems that DRAM is not so forgetful after all! It would seem that some plucky researchers over at Princeton have demonstrated how to obtain critical cryptographic keys for disk encryption systems such as BitLocker and TrueCrypt by cold booting a system an having a look at what is left in memory.
They even have a video of the talk and a paper. This is another example of side attacks on cryptosystems which the great might big boss Bruce has been mentioning for some time now.
They even have a video of the talk and a paper. This is another example of side attacks on cryptosystems which the great might big boss Bruce has been mentioning for some time now.
Subscribe to:
Posts (Atom)