I discovered an interesting video at Hack a Day from the University of Princeton demonstrating how to break disk encryption using so called RAM Dumps. This basically takes into account that the encryption key is stored in RAM. While most disk encryption mechanisms are vulnerable while the computer is on or in sleep mode some are even vulnerable when powered off.
What the researchers did was to boot the computer from an USB drive that loads a RAM dumping program. Tests conducted by the University of Princeton showed that it took between seconds and minutes before data that was stored in RAM was completely erased. The RAM also vanished in a predictable manner.
It's interesting to see that cooling the RAM down to minus 50 degrees prolonged the time the data was readable, it was clearly readable after ten minutes. It's a very interesting video in my opinion.
If you never thought about using a BIOS password and disabling booting from USB devices and CD / DVD before you should start thinking about it right now. That is if you use disk encryption.
Physical access to the PC is obviously required for this method, and that requires some level of preparedness on behalf of the people who try to dump the RAM and extract the encryption key this way. There is no sure fire way to protect the system against this attack if the attackers are prepared. While you can add a BIOS password to the PC and block booting from USB drives or CD and DVDs, it is still possible to take the RAM out of the attacked PC to insert it into a portable reading station or even another PC or mobile device.Advertisement
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.