On the Practicability of Cold Boot Attacks

Size: px
Start display at page:

Download "On the Practicability of Cold Boot Attacks"

Transcription

1 On the Practicability of Cold Boot Attacks Michael Gruhn and Tilo Müller Friedrich-Alexander-University Erlangen-Nuremberg 2013/09/06 Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 1 / 23

2 Outline 1 Introduction RAM Remanence Cold boot attacks Motivation 2 Experiments Setup Results 3 Bypassing software countermeasures 4 Conclusions and Future Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 2 / 23

3 RAM Remanence How DRAM works DRAM consists of multiple capacitors Each capacitor s voltage represents bit state I over 50% charge = ˆ 1 bit / under 50% charge = ˆ 0 bit Voltage in a capacitor decays exponentially over time Memory controller constantly recharges capacitors RAM Remanence Decay significantly longer than time between RAM refreshes Decay so long RAM residue observable after cold/hard reboot Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 3 / 23

4 RAM Remanence How DRAM works DRAM consists of multiple capacitors Each capacitor s voltage represents bit state I over 50% charge = ˆ 1 bit / under 50% charge = ˆ 0 bit Voltage in a capacitor decays exponentially over time Memory controller constantly recharges capacitors RAM Remanence Decay significantly longer than time between RAM refreshes Decay so long RAM residue observable after cold/hard reboot Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 3 / 23

5 Cold boot attacks Cold boot attack Attacker uses RAM remanence to obtain RAM contents Attack procedure 1 Get physical access to victim s computer... either running, locked or suspended to RAM 2 Reboot computer into own OS 3 Read residual RAM content Assets FDE keys Any confidential data in RAM Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 4 / 23

6 Cold boot attacks Cold boot attack Attacker uses RAM remanence to obtain RAM contents Attack procedure 1 Get physical access to victim s computer... either running, locked or suspended to RAM 2 Reboot computer into own OS 3 Read residual RAM content Assets FDE keys Any confidential data in RAM Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 4 / 23

7 Cold boot attacks Cold boot attack Attacker uses RAM remanence to obtain RAM contents Attack procedure 1 Get physical access to victim s computer... either running, locked or suspended to RAM 2 Reboot computer into own OS 3 Read residual RAM content Assets FDE keys Any confidential data in RAM Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 4 / 23

8 Motivation Related work "Least we remember" Halderman et. al. "Bootjacker" Chan et. al. "Cold boot key recovery by solving [...]" Albrecht und Cid "[...] Approach to Recovering Noisy RSA Keys" Paterson et. al... Only "Least we remember" includes practical experiments "Least we remember" Halderman et. al. Never independently verified (to our knowledge) Does not test current DDR3 RAM Unclear how temperature was measured... Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 5 / 23

9 Motivation Related work "Least we remember" Halderman et. al. "Bootjacker" Chan et. al. "Cold boot key recovery by solving [...]" Albrecht und Cid "[...] Approach to Recovering Noisy RSA Keys" Paterson et. al... Only "Least we remember" includes practical experiments "Least we remember" Halderman et. al. Never independently verified (to our knowledge) Does not test current DDR3 RAM Unclear how temperature was measured... Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 5 / 23

10 Outline 1 Introduction RAM Remanence Cold boot attacks Motivation 2 Experiments Setup Results 3 Bypassing software countermeasures 4 Conclusions and Future Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 6 / 23

11 Tools Tools used during the experiments Thermometer Cooling Timing Sinometer DT8380 CRC Kontakt Chemie KÄLTE 75 SUPER SILVA STARTER digital stop watch Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 7 / 23

12 Cold boot attack experiment structure #1 Power up/boot #3 Cool RAM to c C Placement: for(i=0; i < N; i++) { RAM[i] = TESTDATA[i]; } WRITE_BACK_CACHES(); #2 Place test data #4 Shut down Cooling: C(c, t) #5 Wait t 1 Analysis: #6 Power up/boot Extraction: for(i=0; i < N; i++) { DUMP[i] = RAM[i]; } #7 Extract Remanence BIT_ERROR_COUNT = 0; for(i=0; i < N; i++) { #8 Analyze Remanence if( DUMP[i]!= TESTDATA[i] ) { BIT_ERROR_COUNT += POPCOUNT(DUMP[i] ^ TESTDATA[i]); } } 1 Optionally move RAM module to a different computer. Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 8 / 23

13 Execution Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 9 / 23

14 Outline 1 Introduction RAM Remanence Cold boot attacks Motivation 2 Experiments Setup Results 3 Bypassing software countermeasures 4 Conclusions and Future Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 10 / 23

15 Are cold boot attacks possible? YES, cold boot attacks are possible. What RAM remanence behaviour could be observed? DDR type RAM remanence observable after a cold reboot warm reset without cooling with cooling 1 Yes 1 No (reset) 2 Yes 2 Yes No Yes 2 No (reset) 3 Yes No (noise pattern) However, we could not exploit DDR3 RAM in cold reboot Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 11 / 23

16 Are cold boot attacks possible? YES, cold boot attacks are possible. What RAM remanence behaviour could be observed? DDR type RAM remanence observable after a cold reboot warm reset without cooling with cooling 1 Yes 1 No (reset) 2 Yes 2 Yes No Yes 2 No (reset) 3 Yes No (noise pattern) However, we could not exploit DDR3 RAM in cold reboot Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 11 / 23

17 Noise patterns in DDR3 systems after a cold reboot Noise different after each reboot This could either be caused by I I the memory controller intrinsic property of DDR3 Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 12 / 23

18 Does cooling really prolong RAM remanence? Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 13 / 23

19 Does cooling really prolong RAM remanence?: YES Asus Eee PC 1010H with a NT512T64UH8A1FN-3C 512 MiB DDR2 module C 8-11 C C Correct bits (%) Time (s) Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 14 / 23

20 Does cooling really prolong RAM remanence?: YES Asus Eee PC 1010H with a HYMP512S64BP8-Y5 1024MiB DDR2 module C 8-12 C C Correct bits (%) Time (s) Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 15 / 23

21 Can cooled RAM be transplanted? Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 16 / 23

22 Can cooled RAM be transplanted? YES, RAM transplantation is possible. However, the RAM controllers must be compatible Errors for transplantation from Asus Eee PC 1010H to Asus Eee PC 1010H Temperature ( C) Errors (bits) Correct bits (%) Errors low enough for key recovery Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 17 / 23

23 Outline 1 Introduction RAM Remanence Cold boot attacks Motivation 2 Experiments Setup Results 3 Bypassing software countermeasures 4 Conclusions and Future Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 18 / 23

24 Bypassing software countermeasures What mitigation can be bypassed? RAM reset on boot: YES, via RAM transplantation Locked boot process: YES, via RAM transplantation Temperature detection: YES, via non-cooled RAM transplantation 0x7c00 defense: THEORETICALLY, via RAM transplantation Use a two RAM slot machine Transplant victim s RAM into higher address space slot Not practically verified... yet All software countermeasures can be bypassed, because once the RAM is removed it is out of reach of software. Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 19 / 23

25 Bypassing software countermeasures What mitigation can be bypassed? RAM reset on boot: YES, via RAM transplantation Locked boot process: YES, via RAM transplantation Temperature detection: YES, via non-cooled RAM transplantation 0x7c00 defense: THEORETICALLY, via RAM transplantation Use a two RAM slot machine Transplant victim s RAM into higher address space slot Not practically verified... yet All software countermeasures can be bypassed, because once the RAM is removed it is out of reach of software. Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 19 / 23

26 Outline 1 Introduction RAM Remanence Cold boot attacks Motivation 2 Experiments Setup Results 3 Bypassing software countermeasures 4 Conclusions and Future Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 20 / 23

27 Conclusions and future work Conclusions Halderman et al. practically verified Software countermeasures are bypassed via RAM transplantation RAM is unsecure storage DDR3 RAM seems to stop practical cold boot attacks Future work More research to proof inability to exploit DDR3-technology How to sufficiently proof DDR3 not exploitable testing all machines is not practical deeper electrical engineering knowledge of DDR3 needed Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 21 / 23

28 Conclusions and future work Conclusions Halderman et al. practically verified Software countermeasures are bypassed via RAM transplantation RAM is unsecure storage DDR3 RAM seems to stop practical cold boot attacks Future work More research to proof inability to exploit DDR3-technology How to sufficiently proof DDR3 not exploitable testing all machines is not practical deeper electrical engineering knowledge of DDR3 needed Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 21 / 23

29 Questions? 42 Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 22 / 23

30 Questions? PAQ Why did you only test 5 DDR3 machines? No budget University s master agreement on computer hardware Have you contacted Halderman et al. at all? There was unfortunately no time for that Where is that "signature" on system M coming from? We don t know Maybe BIOS probing the RAM Maybe you caused the "signature" by error in your tools? Tested with 2 independently developed tools If we place known data then acquire that it is fine "Signature" only present on one machine Michael Gruhn, Tilo Müller (FAU) On the Practicability of Cold Boot Attacks 2013/09/06 23 / 23

Recovering cryptographic keys with the cold boot attack

Recovering cryptographic keys with the cold boot attack Recovering cryptographic keys with the cold boot attack Nadia Heninger Princeton University April 20, 2010 Joint work with... Lest We Remember: Cold Boot Attacks on Encryption Keys with J. Alex Halderman,

More information

Evaluating Atomicity, and Integrity of Correct Memory Acquisition Methods

Evaluating Atomicity, and Integrity of Correct Memory Acquisition Methods Evaluating Atomicity, and Integrity of Correct Memory Acquisition Methods Michael Gruhn, Felix Freiling 2016-30-03 Department Computer Science IT Security Infrastructures Friedrich-Alexander-University

More information

Recovering cryptographic keys with the cold boot attack

Recovering cryptographic keys with the cold boot attack Recovering cryptographic keys with the cold boot attack Nadia Heninger Princeton University February 15, 2010 Joint work with... Lest We Remember: Cold Boot Attacks on Encryption Keys with J. Alex Halderman,

More information

A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory

A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory Maximilian Seitzer, Michael Gruhn, Tilo Müller Friedrich Alexander Universität Erlangen-Nürnberg https://www1.cs.fau.de Introduction

More information

Novel Hardware-based Attacks. Jason Zheng Aditya Joshi

Novel Hardware-based Attacks. Jason Zheng Aditya Joshi Novel Hardware-based Attacks Jason Zheng Aditya Joshi Introduction Direct hardware hacking is as old as the trade of hacking Common Characteristics: Physical access (at least within transmission range

More information

Isolating Operating System Components with Intel SGX

Isolating Operating System Components with Intel SGX SysTEX 16 Trento, Italy Isolating Operating System Components with Intel SGX Lars Richter, Johannes Götzfried, Tilo Müller Department of Computer Science FAU Erlangen-Nuremberg, Germany December 12, 2016

More information

Information Security Theory vs. Reality

Information Security Theory vs. Reality Information Security Theory vs. Reality 0368-4474, Winter 2015-2016 Lecture 5: Side channels: memory, taxonomy Lecturer: Eran Tromer 1 More architectural side channels + Example of a non-cryptographic

More information

Braving the Cold: New Methods for Preventing Cold Boot Attacks on Encryption Keys

Braving the Cold: New Methods for Preventing Cold Boot Attacks on Encryption Keys Braving the Cold: New Methods for Preventing Cold Boot Attacks on Encryption Keys Patrick McGregor, Ph.D. Tim Hollebeek Alex Volynkin,, Ph.D. Matthew White BitArmor Systems, Inc. 1 Outline Who cares about

More information

SGX Security Background. Masab Ahmad Department of Electrical and Computer Engineering University of Connecticut

SGX Security Background. Masab Ahmad Department of Electrical and Computer Engineering University of Connecticut SGX Security Background Masab Ahmad masab.ahmad@uconn.edu Department of Electrical and Computer Engineering University of Connecticut 1 Security Background Outline Cryptographic Primitives Cryptographic

More information

AMT vpro ME. How to Become the Sole Owner of Your PC. ptsecurity.com

AMT vpro ME. How to Become the Sole Owner of Your PC. ptsecurity.com AMT vpro ME How to Become the Sole Owner of Your PC Mark Ermolov Maxim Goryachy Dmitry Malkin AMT disable techniques Positive Research Center What is it? Second «hidden» processor in your PC Built into

More information

Secure boot under attack: Simulation to enhance fault injection & defenses

Secure boot under attack: Simulation to enhance fault injection & defenses Secure boot under attack: Simulation to enhance fault injection & defenses Martijn Bogaard Senior Security Analyst martijn@riscure.com / @jmartijnb Niek Timmers Principal Security Analyst niek@riscure.com

More information

If conditions require, a safe shutdown of all elements will occur automatically.

If conditions require, a safe shutdown of all elements will occur automatically. Watchdog Overview Watchdog continually monitors and records the internal operating conditions of our products. This constant scrutiny proactively prevents and protects the hardware from costly damage,

More information

Encrypting stored data

Encrypting stored data Encrypting stored data Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 1. Scenarios 2. File encryption Outline 3. Encrypting file system 4. Full disk encryption 5. Data recovery

More information

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 WHAT WE DO What we do Robust and Efficient Cryptographic Protocols Research in Cryptography and

More information

Readings and References. Deadlock. Deadlock. Simple Traffic Gridlock Example. Reading. CSE Computer Systems November 30, 2001.

Readings and References. Deadlock. Deadlock. Simple Traffic Gridlock Example. Reading. CSE Computer Systems November 30, 2001. Readings and References Deadlock Reading Chapter 8, Operating System Concepts, Silberschatz, Galvin, and Gagne CSE 410 - Computer Systems November 30, 2001 Other References 30-Nov-01 CSE 410 - Deadlock

More information

Windows 7 Read The Manual System Restore Memory Could Not

Windows 7 Read The Manual System Restore Memory Could Not Windows 7 Read The Manual System Restore Memory Could Not restore System Restore is a great tool that allows you to revert Windows and its settings to a previous state. This is useful Read this guide and

More information

Capturing RAM. Alex Applegate. Mississippi State University Digital Forensics 1

Capturing RAM. Alex Applegate. Mississippi State University Digital Forensics 1 Capturing RAM Alex Applegate 1 Overview Capture Problems Causing a Process Dump Full Manual Memory Dump Binary Block Copy Tribble Cold Boot Recovery Firewire DMA Attack 2 Capture Problems RAM has many

More information

Lenovo ideapad 110S. User Guide. ideapad 110S-11IBR. Read the safety notices and important tips in the included manuals before using your computer.

Lenovo ideapad 110S. User Guide. ideapad 110S-11IBR. Read the safety notices and important tips in the included manuals before using your computer. Lenovo ideapad 110S ideapad 110S-11IBR User Guide Read the safety notices and important tips in the included manuals before using your computer. Notes Before using the product, be sure to read Lenovo Safety

More information

Chapter 6 - Deadlocks

Chapter 6 - Deadlocks Chapter 6 - Deadlocks Luis Tarrataca luis.tarrataca@gmail.com CEFET-RJ L. Tarrataca Chapter 6 - Deadlocks 1 / 100 1 Motivation 2 Resources Preemptable and Nonpreemptable Resources Resource Acquisition

More information

C13: Current Threats and Countermeasures 2010 Lou Spahn, Accuvant, Inc.

C13: Current Threats and Countermeasures 2010 Lou Spahn, Accuvant, Inc. C13: Current Threats and Countermeasures 2010 Lou Spahn, Accuvant, Inc. Threats and Countermeasures Human Factor and Physical Security Agenda o Social Engineering Phone Based Email/Web (Phishing) Physical

More information

ideapad 100S-14IBR User Guide

ideapad 100S-14IBR User Guide ideapad 100S-14IBR User Guide Read the safety notices and important tips in the included manuals before using your computer. Notes Before using the product, be sure to read Lenovo Safety and General Information

More information

Deadlock. Readings and References. Simple Traffic Gridlock Example. Deadlock. Reading. Other References. CSE 410, Spring 2006 Computer Systems

Deadlock. Readings and References. Simple Traffic Gridlock Example. Deadlock. Reading. Other References. CSE 410, Spring 2006 Computer Systems Reading Readings and References Deadlock CSE 410, Spring 2006 Computer Systems» Chapter 8, Operating System Concepts, Silberschatz, Galvin, and Gagne Other References http://www.cs.washington.edu/education/courses/410/06sp/

More information

System Installation. 3-1 Socket 370 Celeron Processor CHAPTER 3

System Installation. 3-1 Socket 370 Celeron Processor CHAPTER 3 CHAPTER 3 System Installation This chapter provides you with instructions to set up your system. The additional information is enclosed to help you install M-system Flash disk, set up LCD display and handle

More information

Jump Over ASLR: Attacking Branch Predictors to Bypass ASLR

Jump Over ASLR: Attacking Branch Predictors to Bypass ASLR Jump Over ASLR: Attacking Branch Predictors to Bypass ASLR Presentation by Eric Newberry and Youssef Tobah Paper by Dmitry Evtyushkin, Dmitry Ponomarev, and Nael Abu-Ghazaleh 1 Motivation Buffer overflow

More information

CSPN Security Target. HP Sure Start HW Root of Trust NPCE586HA0. December 2016 Reference: HPSSHW v1.3 Version : 1.3

CSPN Security Target. HP Sure Start HW Root of Trust NPCE586HA0. December 2016 Reference: HPSSHW v1.3 Version : 1.3 CSPN Security Target HP Sure Start HW Root of Trust NPCE586HA0 December 2016 Reference: HPSSHW v1.3 Version : 1.3 1 Table of contents 1 Introduction... 4 1.1 Document Context... 4 1.2 Product identification...

More information

Crypto tidbits: misuse, side channels. Slides from Dave Levin 414-spring2016

Crypto tidbits: misuse, side channels. Slides from Dave Levin 414-spring2016 Crypto tidbits: misuse, side channels Slides from Dave Levin 414-spring2016 A paper from 2013 that looked at how Android apps use crypto, as a function of 6 rules that reflect the bare minimum a secure

More information

Energy-aware Reconfiguration of Sensor Nodes

Energy-aware Reconfiguration of Sensor Nodes Energy-aware Reconfiguration of Sensor Nodes Andreas Weissel Simon Kellner Department of Computer Sciences 4 Distributed Systems and Operating Systems Friedrich-Alexander University Erlangen-Nuremberg

More information

Troubleshooting & Repair

Troubleshooting & Repair Chapter Troubleshooting & Repair 6.1 Introduction This chapter provides the most common problem encountered with the M785 notebook computer and some troubleshooting means. Some of the common problems are:

More information

CS Side-Channel Attacks. Vitaly Shmatikov

CS Side-Channel Attacks. Vitaly Shmatikov CS 6431 Side-Channel Attacks Vitaly Shmatikov Acoustic Information in Typing Different keystrokes make different sounds Different locations on the supporting plate Each key is slightly different Frequency

More information

Endpoint security & mobility. AFSecurity, 20. May 2011

Endpoint security & mobility. AFSecurity, 20. May 2011 Endpoint security & mobility AFSecurity, 20. May 2011 INTRODUCTION Layered protection is all good, but what about the endpoint? Mobile units presents a variety of attack vectors Mobile units Small Prone

More information

Intel Software Guard Extensions (Intel SGX) Memory Encryption Engine (MEE) Shay Gueron

Intel Software Guard Extensions (Intel SGX) Memory Encryption Engine (MEE) Shay Gueron Real World Cryptography Conference 2016 6-8 January 2016, Stanford, CA, USA Intel Software Guard Extensions (Intel SGX) Memory Encryption Engine (MEE) Shay Gueron Intel Corp., Intel Development Center,

More information

P4B533-X. Motherboard

P4B533-X. Motherboard P4B533-X Motherboard C1458 2003 2 3 4 5 6 7 1 2 2 3 Jumper Mode Jumper Free (Default) 8 9 10 1-1 1-2 1-3 1-4 SB_PWR1 P4B533-X P4B533-X Onboard LED ON Standby Power OFF Powered Off 1-5 CPU_FAN1 ATX12V1

More information

CTWP005: Write Abort Handling for Cactus Technologies Industrial-Grade Flash-Storage Products

CTWP005: Write Abort Handling for Cactus Technologies Industrial-Grade Flash-Storage Products CTWP005: Write Abort Handling for Cactus Technologies Industrial-Grade Flash-Storage Products Covered Products: -203,-303,-503 CF cards, -900S SATA products, -806,-808 SD cards, -300 USB products 1 Introduction

More information

Engineering Your Software For Attack

Engineering Your Software For Attack Engineering Your Software For Attack Robert A. Martin Senior Principal Engineer Cyber Security Center Center for National Security The MITRE Corporation 2013 The MITRE Corporation. All rights reserved.

More information

Using GIGABYTE Notebook for the First Time

Using GIGABYTE Notebook for the First Time Congratulations on your purchase of the GIGABYTE Notebook P7! This Manual will help you to get started with setting up your notebook. For more detailed information, please visit our website at http://www.gigabyte.com.

More information

How to Power On and Power Off the M29F Flash Memory Device

How to Power On and Power Off the M29F Flash Memory Device Technical Note TN-13-23: M29F Flash Memory Power Guidelines Introduction How to Power On and Power Off the M29F Flash Memory Device Introduction This technical note provides guidelines for providing power

More information

Chapter 3: Computer Assembly

Chapter 3: Computer Assembly Chapter 3: Computer Assembly IT Essentials v6.0 ITE v6.0 1 Chapter 3 - Sections & Objectives 3.1 Assemble the Computer Build a Computer. 3.2 Boot the Computer Explain how to verify BIOS and UEFI settings.

More information

WHAT FUTURE FOR CONTACTLESS CARD SECURITY?

WHAT FUTURE FOR CONTACTLESS CARD SECURITY? WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV Contents Major contactless features : summary Contactless major constraints Major security issues

More information

POWER4 Systems: Design for Reliability. Douglas Bossen, Joel Tendler, Kevin Reick IBM Server Group, Austin, TX

POWER4 Systems: Design for Reliability. Douglas Bossen, Joel Tendler, Kevin Reick IBM Server Group, Austin, TX Systems: Design for Reliability Douglas Bossen, Joel Tendler, Kevin Reick IBM Server Group, Austin, TX Microprocessor 2-way SMP system on a chip > 1 GHz processor frequency >1GHz Core Shared L2 >1GHz Core

More information

Toward (SOS) Self-stabilizing Operating System

Toward (SOS) Self-stabilizing Operating System Toward (SOS) Self-stabilizing Operating System Shlomi Dolev and Reuven Yagel, Ben-Gurion University, Israel Sep. 1st SAACS 04 Workshop, Zaragoza Outline Motivation: current operating systems do not stabilize!

More information

Fitting Ah-ha to a machine using Gecko Stepper drives

Fitting Ah-ha to a machine using Gecko Stepper drives Fitting Ah-ha to a machine using Gecko Stepper drives Please note these instructions are for guidance. If you have any doubt on any particular point please check with us. If you have any difficulties in

More information

Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks

Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks : Defending Against Cache-Based Side Channel Attacks Mengjia Yan, Bhargava Gopireddy, Thomas Shull, Josep Torrellas University of Illinois at Urbana-Champaign http://iacoma.cs.uiuc.edu Presented by Mengjia

More information

Chapter 4. Network Security. Part II

Chapter 4. Network Security. Part II Chapter 4 Network Security Part II CCNA4-1 Chapter 4-2 Introducing Network Security Securing Cisco Routers CCNA4-2 Chapter 4-2 Router Security Issues The Role of Routers in Network Security: Router security

More information

CS356: Discussion #9 Memory Hierarchy and Caches. Marco Paolieri Illustrations from CS:APP3e textbook

CS356: Discussion #9 Memory Hierarchy and Caches. Marco Paolieri Illustrations from CS:APP3e textbook CS356: Discussion #9 Memory Hierarchy and Caches Marco Paolieri (paolieri@usc.edu) Illustrations from CS:APP3e textbook The Memory Hierarchy So far... We modeled the memory system as an abstract array

More information

DFI Lanparty DK P55-T3eH9 BIOS Setting Guideline

DFI Lanparty DK P55-T3eH9 BIOS Setting Guideline DFI Lanparty DK P55-T3eH9 BIOS Setting Guideline (BIOS version: 2009/8/25) V001 Pressing DEL at DK P55-T3eH9 LOG screen to login BIOS setup screen BIOS setup screen Genie BIOS settings: This setup thread

More information

ZKLWHýSDSHU. 3UHð)DLOXUHý:DUUDQW\ý 0LQLPL]LQJý8QSODQQHGý'RZQWLPH. +3ý 1HW6HUYHUý 0DQDJHPHQW. Executive Summary. A Closer Look

ZKLWHýSDSHU. 3UHð)DLOXUHý:DUUDQW\ý 0LQLPL]LQJý8QSODQQHGý'RZQWLPH. +3ý 1HW6HUYHUý 0DQDJHPHQW. Executive Summary. A Closer Look 3UHð)DLOXUHý:DUUDQW\ý 0LQLPL]LQJý8QSODQQHGý'RZQWLPH ZKLWHýSDSHU Executive Summary The Hewlett-Packard Pre-Failure Warranty 1 helps you run your business with less downtime. It extends the advantage of

More information

Lenovo ideapad 710S Plus User Guide

Lenovo ideapad 710S Plus User Guide Lenovo ideapad 710S Plus User Guide Read the safety notices and important tips in the included manuals before using your computer. Notes Before using the product, be sure to read Lenovo Safety and General

More information

A systematic approach to eliminating the vulnerabilities in smart cards evaluation

A systematic approach to eliminating the vulnerabilities in smart cards evaluation A systematic approach to eliminating the vulnerabilities in smart cards evaluation Hongsong Shi, Jinping Gao, Chongbing Zhang hongsongshi@gmail.com China Information Technology Security Evaluation Center

More information

Lenovo ideapad 330S. User Guide. ideapad 330S-15IKB U. ideapad 330S-15IKB D

Lenovo ideapad 330S. User Guide. ideapad 330S-15IKB U. ideapad 330S-15IKB D Lenovo ideapad 330S ideapad 330S-14IKB ideapad 330S-14IKB U ideapad 330S-14IKB D ideapad 330S-15IKB ideapad 330S-15IKB U ideapad 330S-15IKB D User Guide Read the safety notices and important tips in the

More information

Write Abort Handling for Cactus Technologies Industrial-Grade Flash-Storage Products. White paper CTWP005

Write Abort Handling for Cactus Technologies Industrial-Grade Flash-Storage Products. White paper CTWP005 Write Abort Handling for Cactus Technologies Industrial-Grade Flash-Storage Products White paper CTWP005 Cactus Technologies Limited Suite C, 15/F, Capital Trade Center 62 Tsun Yip Street, Kwun Tong Kowloon,

More information

Republic of Gamers AI Suite II User Manual. Maximus V Series

Republic of Gamers AI Suite II User Manual. Maximus V Series DE105 Republic of Gamers AI Suite II User Manual Maximus V Series Installing AI Suite II... 3 To install AI Suite II on your computer... 3 Using AI Suite II... 3 TurboV EVO... 4 TurboV... 4 DIGI+ Power

More information

Lenovo N22. User Guide. included manuals before using your computer. included manuals before using your computer.

Lenovo N22. User Guide. included manuals before using your computer. included manuals before using your computer. Lenovo N22 User Guide Read Read the the safety safety notices notices and and important important tips tips in in the the included manuals before using your computer. included manuals before using your

More information

Side-Channel Attacks on RSA with CRT. Weakness of RSA Alexander Kozak Jared Vanderbeck

Side-Channel Attacks on RSA with CRT. Weakness of RSA Alexander Kozak Jared Vanderbeck Side-Channel Attacks on RSA with CRT Weakness of RSA Alexander Kozak Jared Vanderbeck What is RSA? As we all know, RSA (Rivest Shamir Adleman) is a really secure algorithm for public-key cryptography.

More information

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps 2018 By: RemoveVirus.net Remove A Virus From Your PC In 5 Simple Steps PCs, like Macs and Mobile Devices are susceptible to different types of malware. Avoid panicking when you realize that your PC has

More information

Memory Slot Size FCC Rank Type Organization. DIMM 2 1 GB No 1 unbuffered x8

Memory Slot Size FCC Rank Type Organization. DIMM 2 1 GB No 1 unbuffered x8 After switch on the computer appears: and then: No boot device available - Strike F1 to retry boot, F2 for set-up utility F1 repeats the above statement F2 appears: Dell System 4700 and DELL www.dell.com

More information

Lenovo Y520. User Guide Y520-15IKBN. Read the safety notices and important tips in the included manuals before using your computer.

Lenovo Y520. User Guide Y520-15IKBN. Read the safety notices and important tips in the included manuals before using your computer. Lenovo Y520 Y520-15IKBN User Guide Read the safety notices and important tips in the included manuals before using your computer. Notes Before using the product, be sure to read Lenovo Safety and General

More information

Setting Up U P D AT E D 1 / 3 / 1 6

Setting Up U P D AT E D 1 / 3 / 1 6 Setting Up A GUIDE TO SETTING UP YOUR VIRTUAL MACHINE FOR PYTHON U P D AT E D 1 / 3 / 1 6 Why use a virtual machine? Before we begin, some motivation. Python can be installed on your host OS and many of

More information

Using memory cards (not supplied)

Using memory cards (not supplied) Chapter 1. Getting to know your computer Using memory cards (not supplied) Your computer supports the following types of memory cards: Secure Digital (SD) card Secure Digital High Capacity (SDHC) card

More information

How Often Should I Shutdown My Macbook Air

How Often Should I Shutdown My Macbook Air How Often Should I Shutdown My Macbook Air Mac menus and keyboards often use symbols for certain keys, including the modifier keys: while your Mac is awake to display a dialog asking if you want to restart,

More information

HD MAX Hard Disk Drive Duplicator. User s Manual

HD MAX Hard Disk Drive Duplicator. User s Manual HD MAX Hard Disk Drive Duplicator User s Manual Version 7.0 All rights reserved 2015 Table of Contents I. Introduction 4 1 Features 4 2 Control Panel Overview 4 3 Specifications 5 II. Warning 5 III. Synchronous/Asynchronous

More information

An Introduction to Platform Security

An Introduction to Platform Security presented by An Introduction to Platform Security Spring 2018 UEFI Seminar and Plugfest March 26-30, 2018 Presented by Brent Holtsclaw and John Loucaides (Intel) Legal Notice No computer system can be

More information

Lenovo ideapad 520S/320S User Guide

Lenovo ideapad 520S/320S User Guide Lenovo ideapad 520S/320S User Guide Read the safety notices and important tips in the included manuals before using your computer. Notes Before using the product, be sure to read Lenovo Safety and General

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 4 Supporting Processors

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 4 Supporting Processors A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 4 Supporting Processors Objectives Learn about the characteristics and purposes of Intel and AMD processors used for personal

More information

Lecture 15 Designing Trusted Operating Systems

Lecture 15 Designing Trusted Operating Systems Lecture 15 Designing Trusted Operating Systems Thierry Sans 15-349: Introduction to Computer and Network Security Anatomy of an operating system Concept of Kernel Definition Component that provides an

More information

Android Bootloader and Verified Boot

Android Bootloader and Verified Boot Android Bootloader and Verified Boot Lecture 7 Security of Mobile Devices 2018 SMD Android Bootloader and Verified Boot, Lecture 7 1/38 Bootloader Recovery Verified Boot Bibliography SMD Android Bootloader

More information

Cybersecurity in Data Centers. Murat Cudi Erentürk ISACA CISA, ISO Lead Auditor Gandalf Consulting and Software Ltd.

Cybersecurity in Data Centers. Murat Cudi Erentürk ISACA CISA, ISO Lead Auditor Gandalf Consulting and Software Ltd. Cybersecurity in Data Centers Murat Cudi Erentürk ISACA CISA, ISO 27001 Lead Auditor Gandalf Consulting and Software Ltd. What is Cybersecurity? Information Security IT Systems Security Physical Security

More information

WINDOWS 8.1 RESTORE PROCEDURE

WINDOWS 8.1 RESTORE PROCEDURE Support website: MyDigitalTech Support email: hello@mydigitaltech.com Support phone number: 0845 450 6323 WINDOWS 8.1 RESTORE PROCEDURE This document describes how Windows system recovery works, in the

More information

Lenovo ideapad 520 User Guide

Lenovo ideapad 520 User Guide Lenovo ideapad 520 User Guide Read the safety notices and important tips in the included manuals before using your computer. Notes Before using the product, be sure to read Lenovo Safety and General Information

More information

Introduction. Tech Note 941 Resetting a Non-Responsive Intermec CK61 Device. At times your Intermec CK61 handheld computer can become non-responsive.

Introduction. Tech Note 941 Resetting a Non-Responsive Intermec CK61 Device. At times your Intermec CK61 handheld computer can become non-responsive. Tech Note 941 Resetting a Non-Responsive Intermec CK61 Device All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more

More information

Reconstructing AES Key Schedules from Decayed Memory with FPGAs

Reconstructing AES Key Schedules from Decayed Memory with FPGAs Reconstructing AES Key Schedules from Decayed Memory with FPGAs Heinrich Riebler, Tobias Kenter, Christian Plessl, and Christoph Sorge Department of Computer Science, University of Paderborn 33098 Paderborn,

More information

Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX. Yeongjin Jang, Sangho Lee, and Taesoo Kim Georgia Institute of Technology

Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX. Yeongjin Jang, Sangho Lee, and Taesoo Kim Georgia Institute of Technology Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX Yeongjin Jang, Sangho Lee, and Taesoo Kim Georgia Institute of Technology Kernel Address Space Layout Randomization (KASLR) A statistical

More information

Modbus Map: Automatic Generator Start (AGS) Device

Modbus Map: Automatic Generator Start (AGS) Device Modbus Map: Automatic Start (AGS) Device 503-0247-01-01 Revision A.1 UNINTENDED OPERATION WARNING The use of this product with Modbus communications requires expertise in the design, operation, and programming

More information

Installing Oracle VirtualBox on Windows 10 and Creating a Starter Boot Disk for a Custom Operating System

Installing Oracle VirtualBox on Windows 10 and Creating a Starter Boot Disk for a Custom Operating System Installing Oracle VirtualBox on Windows 10 and Creating a Starter Boot Disk for a Custom Operating System David J. Walling Twitter: @davidjwalling September 14, 2016 This document describes steps for downloading

More information

Application Note, V1.0, Aug AP08064 XC866/886/888. Safeguarding the Microcontroller under Out-of-Spec Noise Conditions.

Application Note, V1.0, Aug AP08064 XC866/886/888. Safeguarding the Microcontroller under Out-of-Spec Noise Conditions. Application Note, V1.0, Aug. 2007 XC866/886/888 AP08064 Safeguarding the Microcontroller under Out-of-Spec Noise Conditions Microcontrollers Edition 2007-08 Published by Infineon Technologies AG 81726

More information

SUPRARAM 500RX OPERATOR S MANUAL

SUPRARAM 500RX OPERATOR S MANUAL SUPRARAM 500RX OPERATOR S MANUAL Congratulations on purchasing the high-performance SupraRAM 500RX for the Amiga 500. The SupraRAM 500RX lets you add up to 8MB of FAST RAM to your system, allowing you

More information

PC setup guide for TRIOS

PC setup guide for TRIOS PC setup guide for TRIOS Details on how to configure a new PC for maximum performance for TRIOS Date: 2016 03 31 Ver: 1.5 Table of contents Table of contents... 2 Introduction... 3 Summary... 5 Perform

More information

Startup Guide Compaq Notebook Series

Startup Guide Compaq Notebook Series b Startup Guide Compaq Notebook Series Document Part Number: 370700-001 June 2004 This guide explains how to set up your notebook and begin using it. It also provides battery pack, power management, and

More information

ECSE-2610 Computer Components & Operations (COCO)

ECSE-2610 Computer Components & Operations (COCO) ECSE-2610 Computer Components & Operations (COCO) Part 18: Random Access Memory 1 Read-Only Memories 2 Why ROM? Program storage Boot ROM for personal computers Complete application storage for embedded

More information

HP Sure Start Gen3. Table of contents. Available on HP Elite products equipped with 7th generation Intel Core TM processors September 2017

HP Sure Start Gen3. Table of contents. Available on HP Elite products equipped with 7th generation Intel Core TM processors September 2017 Technical white paper Gen3 7th generation Intel Core TM processors September 2017 Table of contents 1 Gen3... 2 1.1 Background... 2 1.2 Gen3 overview... 2 1.3 Runtime Intrusion Detection (RTID)... 2 1.3.1

More information

BIOS Setup. 3.1 Knowing BIOS. Chapter 3

BIOS Setup. 3.1 Knowing BIOS. Chapter 3 : BIOS setup BIOS Setup 3.1 Knowing BIOS The new UEFI BIOS is a Unified Extensible Interface that complies with UEFI architecture, offering a user-friendly interface that goes beyond the traditional keyboardonly

More information

Tech Note #51 Title: Setting BIOS settings in Orion Motion Controllers Date: April 24, 2003

Tech Note #51 Title: Setting BIOS settings in Orion Motion Controllers Date: April 24, 2003 19 Linden Park, Rochester, NY 14625 (585) 385-3520 Fax (585) 385-5999 Tech Note #51 Title: Setting BIOS settings in Orion Motion Controllers Date: April 24, 2003 Orion motion controllers use a PC motherboard

More information

Lenovo Legion Y530. User Guide. Legion Y530-15ICH. Read the safety notices and important tips in the included manuals before using your computer.

Lenovo Legion Y530. User Guide. Legion Y530-15ICH. Read the safety notices and important tips in the included manuals before using your computer. Lenovo Legion Y530 Legion Y530-15ICH User Guide Read the safety notices and important tips in the included manuals before using your computer. Notes Before using the product, be sure to read Lenovo Safety

More information

OnRISC. OnRISC Baltos ir 2110

OnRISC. OnRISC Baltos ir 2110 OnRISC OnRISC Baltos ir 2110 Hardware Manual Edition: October 2015 Tel: +49 40 528 401 0 Fax: +49 40 528 401 99 Web: www.visionsystems.de Support: service@visionsystems.de The software described in this

More information

2016 Trimble Juno 5 Guidance for NRI Grazing Lands Inventory Activities

2016 Trimble Juno 5 Guidance for NRI Grazing Lands Inventory Activities 2016 Trimble Juno 5 Guidance for NRI Grazing Lands Inventory Activities To prevent data loss, please purchase/insert a microsd or micro SDHC 4 to 8 GB (really low cost) will be sufficient you don t need

More information

How To Run Windows Update Manually Xp

How To Run Windows Update Manually Xp How To Run Windows Update Manually Xp Internet Explorer 8 Mode Do I have to uninstall Internet Explorer 11 prior to installing 8 or 7? remove an IE update, IE will revert to the next-earliest version (so

More information

KEY RECOVERY FROM DECAYED MEMORY IMAGES AND OBFUSCATION OF CRYPTOGRAPHIC ALGORITHMS

KEY RECOVERY FROM DECAYED MEMORY IMAGES AND OBFUSCATION OF CRYPTOGRAPHIC ALGORITHMS KEY RECOVERY FROM DECAYED MEMORY IMAGES AND OBFUSCATION OF CRYPTOGRAPHIC ALGORITHMS ROGER ZAHNO A THESIS IN CONCORDIA INSTITUTE FOR INFORMATION SYSTEMS ENGINEERING PRESENTED IN PARTIAL FULFILLMENT OF THE

More information

A Passive Approach to Wireless NIC Identification

A Passive Approach to Wireless NIC Identification A Passive Approach to Wireless NIC Identification Cherita Corbett Georgia Institute of Technology IEEE ICC 2006 June 13, 2006 Presentation Outline Motivation & Background Objective NIC Identification using

More information

N Series BIOS BIOS SETUP UTILITY

N Series BIOS BIOS SETUP UTILITY BIOS SECTION N3530 LifeBook N Series Notebook BIOS N Series BIOS BIOS SETUP UTILITY The BIOS Setup Utility is a program that sets up the operating environment for your notebook. Your BIOS is set at the

More information

SP31. User Guide. January 2015 Document Revision 03

SP31. User Guide. January 2015 Document Revision 03 SP31 User Guide January 2015 Document Revision 03 SP31 User Guide Release Date: January 2015 COPYRIGHT Spondoolies-Tech Ltd. 2015. All rights reserved. www.spondoolies-tech.com Changes are periodically

More information

Fault-Based Attack of RSA Authentication

Fault-Based Attack of RSA Authentication Fault-Based Attack of RSA Authentication, Valeria Bertacco and Todd Austin 1 Cryptography: Applications 2 Value of Cryptography $2.1 billions 1,300 employees $1.5 billions 4,000 employees $8.7 billions

More information

Smart Spot Hardware: Specifications

Smart Spot Hardware: Specifications What s Inside 1. Smart Spot 1.1. Hardware configurations 2. Expanding functionalities in the Smart Spot 2.1. Expansion boards 2.1.1. Air Quality monitoring 2.1.1.1. Alphasense sensors 2.1.1.1.1. Alphasense

More information

v02.54 (C) Copyright , American Megatrends, Inc.

v02.54 (C) Copyright , American Megatrends, Inc. 1 Main Advanced H/W Monitor Boot Security Exit System Overview System Time System Date BIOS Version Processor Type Processor Speed Cache Size [ 14:00:09] [Fri 05/19/2006] : ConRoe865PE BIOS P1.00 : Intel

More information

Co-Design of Many-Accelerator Heterogeneous Systems Exploiting Virtual Platforms. SAMOS XIV July 14-17,

Co-Design of Many-Accelerator Heterogeneous Systems Exploiting Virtual Platforms. SAMOS XIV July 14-17, Co-Design of Many-Accelerator Heterogeneous Systems Exploiting Virtual Platforms SAMOS XIV July 14-17, 2014 1 Outline Introduction + Motivation Design requirements for many-accelerator SoCs Design problems

More information

Veritas System Recovery Disk Help

Veritas System Recovery Disk Help Veritas System Recovery Disk Help About recovering a computer If Windows fails to start or does not run normally, you can still recover your computer. You can use the Veritas System Recovery Disk and an

More information

Dacorum U3A. Computer Support Group. 30 th October 2015

Dacorum U3A. Computer Support Group. 30 th October 2015 Dacorum U3A Computer Support Group 30 th October 2015 Agenda Open forum Identify subjects for breakout groups and later meetings Main presentation Tea and coffee break (3.30pm) Breakout into smaller groups

More information

How To Configure PowerAlert on Linux with the APC BackUPS Pro 280VA (v2.0, 5Sept2002)

How To Configure PowerAlert on Linux with the APC BackUPS Pro 280VA (v2.0, 5Sept2002) How To Configure PowerAlert on Linux with the APC BackUPS Pro 280VA (v2.0, 5Sept2002) This How-To explains the steps involved in setting up a Dell or Penguin computer system with Red Hat Linux v7.3 for

More information

Managing the Servers

Managing the Servers Managing the Servers This chapter includes the following sections: Booting a Server, page 1 Shutting Down a Server, page 2 Power Cycling a Server, page 3 Performing a Hard Reset on a Server, page 3 Acknowledging

More information

Using GIGABYTE Notebook for the First Time

Using GIGABYTE Notebook for the First Time Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point of your

More information

Guide to SiS RAID Utility for Windows XP / 2000

Guide to SiS RAID Utility for Windows XP / 2000 Guide to SiS RAID Utility for Windows XP / 2000 1. General 1. After installing the SiS RAID utility, go to Start menu and choose Programs. From the Programs menu, choose SiS RAID Utility and click on SiSRaid

More information

HP StorageWorks P2000 G3 MSA System Event Descriptions Reference Guide

HP StorageWorks P2000 G3 MSA System Event Descriptions Reference Guide HP StorageWorks P2000 G3 MSA System Event Descriptions Reference Guide Part number: 591224-003 First edition: September 2010 Legal and notice information Copyright 2010 Hewlett-Packard Development Company,

More information