Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - Researchers Attack Android's Encryption by Freezing the Smartphone, Literally-> 1

Submitted by hypnosec
hypnosec (2231454) writes "Researchers have showcased a novel way through which encrypted data of an Android smartphone can be read by accessing the cryptographic key stored in the phone’s memory by freezing the phone. Two researchers, Tilo Müller and Michael Spreitzenbarth, over at the University of Erlangen in Germany cooled down a Galaxy Nexus phone, loaded with Android 4.0 and with encryption enabled, below 10 degrees by putting it in a freezer. This cooling ensures that the data within the volatile memory is retained for a short period of time without any power supply. To ensure that they still have access to this ‘frozen’ memory content they disconnected and reconnected the battery in less than 500ms such that it results into a reboot. Rebooting the phone in ‘fastboot’ mode, they flashed the FROST recovery image onto the Galaxy Nexus. Connecting the device to a Linux system that had FROST utilities pre-installed the duo, using a special tool that uses the cold boot attack [PDF], went onto to read the contents of the phone's memory including the cryptographic keys."
Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Researchers Attack Android's Encryption by Freezing the Smartphone, Literally

Comments Filter:

Most public domain software is free, at least at first glance.