{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:33:13Z","timestamp":1759825993698,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T00:00:00Z","timestamp":1651536000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T00:00:00Z","timestamp":1651536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s10207-022-00589-4","type":"journal-article","created":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T13:03:48Z","timestamp":1651583028000},"page":"1005-1018","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["BitCracker: BitLocker meets GPUs"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7118-0051","authenticated-orcid":false,"given":"E.","family":"Agostini","sequence":"first","affiliation":[]},{"given":"M.","family":"Bernaschi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,3]]},"reference":[{"key":"589_CR1","doi-asserted-by":"crossref","unstructured":"T\u00fcrpe, S., et al.: Attacking the bitlocker boot process. Trust 2009. Lecture Notes in Computer Science, vol 5471. Springer","DOI":"10.1007\/978-3-642-00587-9_12"},{"key":"589_CR2","unstructured":"Han, S., Park, J.: BitLeaker: subverting bitlocker with one vulnerability. Blackhat Europe (2019). https:\/\/www.blackhat.com\/eu-19\/briefings\/schedule\/index.html#bitleaker-subverting-bitlocker-with-one-vulnerability-17245"},{"issue":"5","key":"589_CR3","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"J Halderman","year":"2009","unstructured":"Halderman, J.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91\u201398 (2009)","journal-title":"Commun. ACM"},{"key":"589_CR4","unstructured":"Elcomsoft Forensic Disk Decryptor. https:\/\/www.elcomsoft.com\/efdd.html. Checked on May 20 (2018)"},{"key":"589_CR5","unstructured":"Elcomsoft blog post. https:\/\/blog.elcomsoft.com\/2016\/07\/breaking-bitlocker-encryption-brute-forcing-the-backdoor-part-ii"},{"key":"589_CR6","unstructured":"Hashcat. https:\/\/hashcat.net\/hashcat. Checked on May 20 (2018)"},{"key":"589_CR7","unstructured":"CUDA Developer Zone. https:\/\/developer.nvidia.com\/cuda-zone"},{"key":"589_CR8","unstructured":"OpenCL. https:\/\/www.khronos.org\/opencl"},{"key":"589_CR9","unstructured":"Microsoft blog: recover password method. https:\/\/docs.microsoft.com\/en-us\/windows\/device-security\/bitlocker\/bitlocker-recovery-guide-plan"},{"key":"589_CR10","unstructured":"Kumar, N., Kumar, V.: Bitlocker and windows vista (2008). http:\/\/www.nvlabs.in\/uploads\/projects\/nvbit\/nvbit_bitlocker_white_paper.pdf. Checked on May 20 (2018)"},{"key":"589_CR11","unstructured":"Dislocker: FUSE driver to read\/write Windows\u2019 BitLocker-ed volumes under Linux\/Mac OSX. https:\/\/github.com\/Aorimn\/dislocker. Checked on May 20 (2018)"},{"key":"589_CR12","unstructured":"BitLocker Drive Encryption (BDE) format specification. https:\/\/github.com\/libyal\/libbde\/tree\/master\/documentation. Checked on May 20 (2018)"},{"issue":"3\u20134","key":"589_CR13","first-page":"75","volume":"5","author":"Jesse D Kornblum","year":"2009","unstructured":"Kornblum, Jesse D.: Implementing bitlocker drive encryption for forensic analysis. Digit. Investig. Int. J. Digit. Forensics Incid. Response Arch. 5(3\u20134), 75\u201384 (2009)","journal-title":"Digit. Investig. Int. J. Digit. Forensics Incid. Response Arch."},{"key":"589_CR14","unstructured":"GPU on wikipedia. https:\/\/it.wikipedia.org\/wiki\/Graphics_Processing_Unit"},{"key":"589_CR15","doi-asserted-by":"crossref","unstructured":"Dadda, L., Macchetti, M., Owen, J.: The design of a high speed ASIC unit for the hash function SHA-256 (384, 512). In: Proceedings of the Conference on Design, Automation and Test in Europe-Volume 3. IEEE Computer Society (2004)","DOI":"10.1145\/988952.989053"},{"key":"589_CR16","doi-asserted-by":"crossref","unstructured":"Chaves, R., et al.: Improving SHA-2 hardware implementations. In: International Workshop on Cryptographic Hardware and Embedded Systems. Springer (2006)","DOI":"10.1007\/11894063_24"},{"key":"589_CR17","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Chan, H., Verbauwhede, I.: Iteration bound analysis and throughput optimum architecture of SHA-256 (384,512) for hardware implementations. In: International Workshop on Information Security Applications. Springer (2007)","DOI":"10.1007\/978-3-540-77535-5_8"},{"key":"589_CR18","doi-asserted-by":"crossref","unstructured":"Courtois, N.T., Grajek, M., Naik, R.: Optimizing sha256 in bitcoin mining. In: International Conference on Cryptography and Security Systems. Springer (2014)","DOI":"10.1007\/978-3-662-44893-9_12"},{"key":"589_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, X., Hu, H.:Optimization of hash function implementation for bitcoin mining. In: Advances in Computer Science Research, vol. 87 (2019)","DOI":"10.2991\/icmeit-19.2019.73"},{"key":"589_CR20","doi-asserted-by":"publisher","unstructured":"Secure Hash Standard (SHS), Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD 20899-8900. https:\/\/doi.org\/10.6028\/NIST.FIPS.180-4. Checked on May 20 (2018)","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"589_CR21","unstructured":"SHA-256 Nayuki implementation. http:\/\/nayuki.eigenstate.org\/page\/fast-sha2-hashes-in-x86-assembly (Checked on May 20 2018)"},{"issue":"12","key":"589_CR22","doi-asserted-by":"publisher","first-page":"2088","DOI":"10.1016\/j.jss.2011.05.027","volume":"84","author":"M Bernaschi","year":"2011","unstructured":"Bernaschi, M., Bisson, M., Milo, F.: A fast, GPU based, dictionary attack to OpenPGP secret keyrings. J. Syst. Softw. 84(12), 2088\u20132096 (2011)","journal-title":"J. Syst. Softw."},{"key":"589_CR23","unstructured":"NVIDIA Developer Zone Maxwell. https:\/\/developer.nvidia.com\/maxwell-compute-architecture"},{"key":"589_CR24","unstructured":"NVIDIA Devblog. https:\/\/devblogs.nvidia.com\/parallelforall\/new-features-cuda-7-5"},{"key":"589_CR25","unstructured":"NVIDIA PTX LOP3. http:\/\/docs.nvidia.com\/cuda\/parallel-thread-execution\/#logic-and-shift-instructions-lop3"},{"key":"589_CR26","unstructured":"Openwall HPC Village. http:\/\/openwall.info\/wiki\/HPC\/Village. Checked on May 20 (2018)"},{"key":"589_CR27","unstructured":"John the Ripper. http:\/\/www.openwall.com\/john. Checked on May 20 (2018)"},{"key":"589_CR28","unstructured":"John the Ripper GitHub. https:\/\/github.com\/magnumripper\/JohnTheRipper. Checked on May 20 (2018)"},{"key":"589_CR29","unstructured":"John the Ripper BitCracker Wiki Page. http:\/\/openwall.info\/wiki\/john\/OpenCL-BitLocker. Checked on May 20 (2018)"},{"key":"589_CR30","unstructured":"BitCracker on GitHub. https:\/\/github.com\/e-ago\/bitcracker. Checked on May 20 (2018)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00589-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00589-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00589-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T15:49:40Z","timestamp":1663948180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00589-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,3]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["589"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00589-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2022,5,3]]},"assertion":[{"value":"3 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"Author Elena Agostini declares that she has no conflict of interest. Author Massimo Bernaschi declares that he has no conflict of interest. This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}