This #reconmtl talk by Ang Cui looks epic: Ice Ice Baby: Coppin' RAM With DIY Cryo-Mechanical Robot https://cfp.recon.cx/2023/talk/HCJHBW/
(coverage at https://www.theregister.com/2023/06/09/cold_boot_ram_theft/ by @thomasclaburn)
This #reconmtl talk by Ang Cui looks epic: Ice Ice Baby: Coppin' RAM With DIY Cryo-Mechanical Robot https://cfp.recon.cx/2023/talk/HCJHBW/
(coverage at https://www.theregister.com/2023/06/09/cold_boot_ram_theft/ by @thomasclaburn)
@hdm Having known a lot of the individuals who worked on the "Lest We Remember: Cold Boot Attacks on Encryption Keys" and having been privy to some of their research prior to publication, seeing others level up that research 15 years later and even after "Lest we forget: Cold-boot attacks on scrambled DDR3 memory" (2016) is wonderful!
Also it's yet another example of whatever the adage/truism is that over time vulnerabilities typically become easier to exploit and attacks more sophisticated (we've probably got a "law" for it somewhere that is evading my recollection, but "Attacks only get better with
> time, and SHA-1 is certainly creaking." by Perry E. Metzger from: https://www.mail-archive.com/cryptography@metzdowd.com/msg10800.html is just one example that is a little less generalized which I am able to pull from "teh intarwebz" presently)