Computer security compromised by hardware failure: Difference between revisions

Content deleted Content added
Bender the Bot (talk | contribs)
m Processor bug and backdoors: HTTP → HTTPS for Columbia.edu CS, replaced: http://www.cs.columbia.edu/ → https://www.cs.columbia.edu/
Monkbot (talk | contribs)
m Task 16: replaced (4×) / removed (0×) deprecated |dead-url= and |deadurl= with |url-status=;
Line 211:
 
=== Chemical ===
* {{Citation | last1 = Gutmann | first1 = Peter | title = Data Remanence in Semiconductor Devices | volume = 10 | pages = 4 | periodical = Proceedings of the 10th Conference on USENIX Security Symposium SSYM'01 | publisher = USENIX Association Berkeley, California, USA | url = http://www.cypherpunks.to/~peter/usenix01.pdf | year = 2001 | ref = Gut1 | access-date = 2010-12-13 | archive-url = https://web.archive.org/web/20070221201213/http://www.cypherpunks.to/~peter/usenix01.pdf | archive-date = 2007-02-21 | dead-url-status = yesdead }}
 
=== Electromagnetic ===
Line 222:
=== FireWire ===
* {{Citation| last1 = Dornseif | first1 = Maximillian | title = 0wned by an iPod | pages = | periodical = PacSec | place = | url = http://pi1.informatik.uni-mannheim.de/filepool/publications/13.pdf | year = 2004 | doi = | isbn = | ref = Dorn1 }}
* {{Citation | last1 = Dornseif | first1 = Maximillian | title = FireWire all your memory are belong to us | pages = | periodical = CanSecWest | place = | url = http://md.hudora.de/presentations/firewire/2005-firewire-cansecwest.pdf | year = 2005 | doi = | isbn = | ref = Dorn2 | access-date = 2010-12-17 | archive-url = https://web.archive.org/web/20091229032404/http://md.hudora.de/presentations/firewire/2005-firewire-cansecwest.pdf | archive-date = 2009-12-29 | dead-url-status = yesdead }}
 
=== Processor bug and backdoors ===
* {{cite book| last1 = Duflot | first1 = Loïc | title = Computer Security - ESORICS 2008 | volume = 5283| pages = 580–599 | periodical = ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security | ___location = | chapter-url = http://www.springerlink.com/index/jp07870p24560678.pdf | year = 2008 | issn = | doi = 10.1007/978-3-540-88313-5_37 | isbn = 978-3-540-88312-8 | accessdate = | ref = Dufl2| chapter = CPU Bugs, CPU Backdoors and Consequences on Security | series = Lecture Notes in Computer Science }}
* {{Citation | last1 = Duflot | first1 = Loïc | title = Using CPU System Management Mode to Circumvent Operating System Security Functions | volume = | pages = 580–599 | periodical = Proceedings of CanSecWest | ___location = | url = http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot-paper.pdf | year = 2008 | issn = | doi = | isbn = | accessdate = | ref = Dufl3 | archive-url = https://web.archive.org/web/20060526181027/http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot-paper.pdf | archive-date = 2006-05-26 | dead-url-status = yesdead }}
* {{Citation| last1 = Waksman | first1 = Adam | title = Tamper Evident Microprocessors | volume = | pages = | periodical = Proceedings of the IEEE Symposium on Security and Privacy | ___location = Oakland, California | url = https://www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf | year = 2010 | issn = | doi = | isbn = | accessdate = | ref = Waks1}}
 
=== Temperature ===
* {{Citation| last1 = Skorobogatov| first1 = Sergei | title = Low temperature data remanence in static RAM | publisher = University of Cambridge Computer Laboratory | place = Cambridge, UK| url = http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-536.pdf | year = 2002 | issn = 1476-2986 | ref = Sko1}}
* {{Citation | last1 = Halderman | first1 = J. Alex | last2 = Schoen | first2 = Seth D. | last3 = Heninger | first3 = Nadia | author3-link = Nadia Heninger | last4 = Clarkson | first4 = William | last5 = Paul | first5 = William | last6 = Calandrino | first6 = Joseph A. | last7 = Feldman | first7 = Ariel J. | last8 = Appelbaum | first8 = Jacob | last9 = Felten | first9 = Edward W. | title = Lest We Remember: Cold Boot Attacks on Encryption Keys | booktitle = Communications of the ACM – Security in the Browser | volume = 52 | issue = 5 | pages = 45–60 | periodical = Proceedings of the USENIX Security Symposium | publisher = ACM New York, New York, USA | url = http://citp.princeton.edu/pub/coldboot.pdf | year = 2008 | issn = 0001-0782 | doi = 10.1145/1506409.1506429 | isbn = 978-1-931971-60-7 | ref = Hald1 | deadurlurl-status = yesdead | archiveurl = https://web.archive.org/web/20110904213748/http://citp.princeton.edu/pub/coldboot.pdf | archivedate = 2011-09-04 | df = }}
 
=== Timing attacks ===