{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:43:21Z","timestamp":1773888201372,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T00:00:00Z","timestamp":1323043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,5]]},"DOI":"10.1145\/2076732.2076743","type":"proceedings-article","created":{"date-parts":[[2011,12,13]],"date-time":"2011-12-13T15:46:00Z","timestamp":1323791160000},"page":"73-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["Security through amnesia"],"prefix":"10.1145","author":[{"given":"Patrick","family":"Simmons","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2011,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cachegrind: a cache-miss profiler. http:\/\/wwwcdf.pd.infn.it\/valgrind\/cg_main.html.  Cachegrind: a cache-miss profiler. http:\/\/wwwcdf.pd.infn.it\/valgrind\/cg_main.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Truecrypt: Free open-source on-the-fly encryption. http:\/\/www.truecrypt.org\/.  Truecrypt: Free open-source on-the-fly encryption. http:\/\/www.truecrypt.org\/."},{"key":"e_1_3_2_1_3_1","volume-title":"June","author":"Hard","year":"2004","unstructured":"Hard drive secrets sold cheaply. http:\/\/news.bbc.co.uk\/2\/hi\/technology\/3788395.stm , June 2004 . Hard drive secrets sold cheaply. http:\/\/news.bbc.co.uk\/2\/hi\/technology\/3788395.stm, June 2004."},{"key":"e_1_3_2_1_4_1","volume-title":"May","year":"2006","unstructured":"drop caches. http:\/\/www.linuxinsight.com\/proc_sys_vm_drop_caches.html , May 2006 . drop caches. http:\/\/www.linuxinsight.com\/proc_sys_vm_drop_caches.html, May 2006."},{"key":"e_1_3_2_1_5_1","volume-title":"January","author":"Privacy","year":"2011","unstructured":"Privacy at risk after burglary at doctor's office. http:\/\/www.cbc.ca\/health\/story\/2011\/01\/21\/nb-privacy-warning.html , January 2011 . Privacy at risk after burglary at doctor's office. http:\/\/www.cbc.ca\/health\/story\/2011\/01\/21\/nb-privacy-warning.html, January 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_28"},{"key":"e_1_3_2_1_7_1","volume-title":"CE Embedded Linux Conference","author":"Anderson Mike","year":"2008","unstructured":"Mike Anderson . Using a JTAG in linux driver debugging . In CE Embedded Linux Conference , 2008 . http:\/\/elinux.org\/images\/4\/4e\/CELF_JTAG_Anderson.ppt. Mike Anderson. Using a JTAG in linux driver debugging. In CE Embedded Linux Conference, 2008. http:\/\/elinux.org\/images\/4\/4e\/CELF_JTAG_Anderson.ppt."},{"key":"e_1_3_2_1_9_1","unstructured":"Bob Brown. How to roll out full disk encryption on your pcs and laptops. http:\/\/www.networkworld.com\/news\/2010\/081610-encryption.html August 2010.  Bob Brown. How to roll out full disk encryption on your pcs and laptops. http:\/\/www.networkworld.com\/news\/2010\/081610-encryption.html August 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920307"},{"key":"e_1_3_2_1_11_1","first-page":"681","volume":"3","author":"Intel Corporation","year":"2011","unstructured":"Intel Corporation . IA-32 architectural MSRs. Intel 64 and IA-32 Architectures Software Developer's Manual , 3B : 681 -- 722 , January 2011 . http:\/\/www.intel.com\/Assets\/PDF\/manual\/253669.pdf. Intel Corporation. IA-32 architectural MSRs. Intel 64 and IA-32 Architectures Software Developer's Manual, 3B:681--722, January 2011. http:\/\/www.intel.com\/Assets\/PDF\/manual\/253669.pdf.","journal-title":"Architectures Software Developer's Manual"},{"key":"e_1_3_2_1_12_1","volume-title":"Microsoft Technet","author":"Microsoft Corporation","year":"2010","unstructured":"Microsoft Corporation . Bitlocker drive encryption technical overview . Microsoft Technet , 2010 . http:\/\/technet.microsoft.com\/en-us\/library\/cc732774\\%28WS.10\\%29.aspx. Microsoft Corporation. Bitlocker drive encryption technical overview. Microsoft Technet, 2010. http:\/\/technet.microsoft.com\/en-us\/library\/cc732774\\%28WS.10\\%29.aspx."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294295"},{"key":"e_1_3_2_1_14_1","volume-title":"USA Today","author":"Curran John","year":"2008","unstructured":"John Curran . Encrypted laptop poses 5th amendment dilemma . USA Today , February 2008 . http:\/\/www.usatoday.com\/tech\/news\/techpolicy\/2008-02-07-encrypted-laptop-child-porn_N.htm. John Curran. Encrypted laptop poses 5th amendment dilemma. USA Today, February 2008. http:\/\/www.usatoday.com\/tech\/news\/techpolicy\/2008-02-07-encrypted-laptop-child-porn_N.htm."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"Daemen Joan","year":"2002","unstructured":"Joan Daemen and Vincent Rijmen . The Design of Rijndael . Springer-Verlag New York, Inc. , Secaucus, NJ, USA , 2002 . Joan Daemen and Vincent Rijmen. The Design of Rijndael. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2002."},{"key":"e_1_3_2_1_16_1","first-page":"469","volume":"2","author":"Devices Advanced Micro","year":"2010","unstructured":"Advanced Micro Devices . MS Rs of the AMD64 architecture. AMD64 Architecture Programmer's Manual , 2 : 469 -- 472 , June 2010 . http:\/\/support.amd.com\/us\/Processor_TechDocs\/24593.pdf. Advanced Micro Devices. MSRs of the AMD64 architecture. AMD64 Architecture Programmer's Manual, 2:469--472, June 2010. http:\/\/support.amd.com\/us\/Processor_TechDocs\/24593.pdf.","journal-title":"Architecture Programmer's Manual"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.56"},{"key":"e_1_3_2_1_18_1","volume-title":"Linux Weekly News, 2006","author":"Edge Jake","year":"1849","unstructured":"Jake Edge . Holes in the linux random number generator ? Linux Weekly News, 2006 . http:\/\/lwn.net\/Articles\/ 1849 25\/. Jake Edge. Holes in the linux random number generator? Linux Weekly News, 2006. http:\/\/lwn.net\/Articles\/184925\/."},{"key":"e_1_3_2_1_19_1","volume-title":"December","author":"Foley David W.","year":"2010","unstructured":"David W. Foley . http:\/\/doj.nh.gov\/consumer\/pdf\/wackenhut.pdf , December 2010 . David W. Foley. http:\/\/doj.nh.gov\/consumer\/pdf\/wackenhut.pdf, December 2010."},{"key":"e_1_3_2_1_21_1","unstructured":"Trusted Computing Group. TCG platform reset attack mitigation specification. http:\/\/www.trustedcomputinggroup.org\/resources\/pc_client_work_group_platform_reset_attack_mitigation_specification_version_10\/ 2008.  Trusted Computing Group. TCG platform reset attack mitigation specification. http:\/\/www.trustedcomputinggroup.org\/resources\/pc_client_work_group_platform_reset_attack_mitigation_specification_version_10\/ 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.5"},{"key":"e_1_3_2_1_23_1","first-page":"45","volume-title":"USENIX Security Symposium","author":"Halderman J. Alex","year":"2008","unstructured":"J. Alex Halderman , Seth D. Schoen , Nadia Heninger , William Clarkson , William Paul , Joseph A. Calandrino , Ariel J. Feldman , Jacob Appelbaum , and Edward W. Felten . Lest we remember: Cold boot attacks on encryption keys. In Paul C. van Oorschot, editor , USENIX Security Symposium , pages 45 -- 60 . USENIX Association , 2008 . J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Paul C. van Oorschot, editor, USENIX Security Symposium, pages 45--60. USENIX Association, 2008."},{"key":"e_1_3_2_1_24_1","unstructured":"Zack Albus Markus Koesler Franz Graf. Programming a flash-based msp430 using a JTAG interface. http:\/\/www.softbaugh.com\/downloads\/slaa149.pdf December 2002.  Zack Albus Markus Koesler Franz Graf. Programming a flash-based msp430 using a JTAG interface. http:\/\/www.softbaugh.com\/downloads\/slaa149.pdf December 2002."},{"key":"e_1_3_2_1_25_1","volume-title":"Braving the cold: New methods for preventing cold boot attacks on encryption keys","author":"McGregor Patrick","year":"2008","unstructured":"Patrick McGregor , Tim Hollebeek , Alex Volynkin , and Matthew White . Braving the cold: New methods for preventing cold boot attacks on encryption keys , 2008 . Patrick McGregor, Tim Hollebeek, Alex Volynkin, and Matthew White. Braving the cold: New methods for preventing cold boot attacks on encryption keys, 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1752046.1752053"},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX Security Symposium 2011","author":"M\u00fcller Tilo","year":"2011","unstructured":"Tilo M\u00fcller , Andreas Dewald , and Felix C. Freiling . Tresor: Tresor runs encryption securely outside ram . In USENIX Security Symposium 2011 , 2011 . Tilo M\u00fcller, Andreas Dewald, and Felix C. Freiling. Tresor: Tresor runs encryption securely outside ram. In USENIX Security Symposium 2011, 2011."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_2"},{"key":"e_1_3_2_1_29_1","volume-title":"http:\/\/frozencache.blogspot.com","author":"Pabel J\u00fcrgen","year":"2009","unstructured":"J\u00fcrgen Pabel . http:\/\/frozencache.blogspot.com , 2009 . J\u00fcrgen Pabel. http:\/\/frozencache.blogspot.com, 2009."},{"key":"e_1_3_2_1_30_1","unstructured":"OpenSolaris Project. ZFS on-disk encryption support. http:\/\/hub.opensolaris.org\/bin\/view\/Project+zfs-crypto\/WebHome.  OpenSolaris Project. ZFS on-disk encryption support. http:\/\/hub.opensolaris.org\/bin\/view\/Project+zfs-crypto\/WebHome."},{"key":"e_1_3_2_1_31_1","unstructured":"Jari Ruusu. http:\/\/loop-aes.sourceforge.net\/.  Jari Ruusu. http:\/\/loop-aes.sourceforge.net\/."},{"key":"e_1_3_2_1_32_1","volume-title":"June","author":"Ruusu Jari","year":"2008","unstructured":"Jari Ruusu . http:\/\/mail.nl.linux.org\/linux-crypto\/2008-06\/msg00002.html , June 2008 . Jari Ruusu. http:\/\/mail.nl.linux.org\/linux-crypto\/2008-06\/msg00002.html, June 2008."},{"key":"e_1_3_2_1_33_1","unstructured":"Christophe Sauot. dm-crypt: A device-mapper crypto target. http:\/\/www.saout.de\/misc\/dm-crypt\/.  Christophe Sauot. dm-crypt: A device-mapper crypto target. http:\/\/www.saout.de\/misc\/dm-crypt\/."},{"key":"e_1_3_2_1_34_1","first-page":"191","volume-title":"Cambridge Security Workshop","author":"Schneier Bruce","year":"1994","unstructured":"Bruce Schneier . Description of a new variable-length key, 64-bit block cipher (blowfish). In Fast Software Encryption , Cambridge Security Workshop , pages 191 -- 204 , London, UK , 1994 . Springer-Verlag. Bruce Schneier. Description of a new variable-length key, 64-bit block cipher (blowfish). In Fast Software Encryption, Cambridge Security Workshop, pages 191--204, London, UK, 1994. Springer-Verlag."},{"key":"e_1_3_2_1_35_1","first-page":"378","volume-title":"Performance monitor counter registers. MPC750 RISC Processor Family User's Manual","author":"Semiconductor Freescale","year":"2001","unstructured":"Freescale Semiconductor . Performance monitor counter registers. MPC750 RISC Processor Family User's Manual , pages 378 -- 382 , December 2001 . http:\/\/www.freescale.com\/files\/32bit\/doc\/ref_manual\/MPC750UM.pdf. Freescale Semiconductor. Performance monitor counter registers. MPC750 RISC Processor Family User's Manual, pages 378--382, December 2001. http:\/\/www.freescale.com\/files\/32bit\/doc\/ref_manual\/MPC750UM.pdf."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294294"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/978-3-642-14452-3_5","volume-title":"Towards Hardware-Intrinsic Security, Information Security and Cryptography","author":"Standaert Francois-Xavier","year":"2010","unstructured":"Francois-Xavier Standaert , Olivier Pereira , Yu Yu , Jean-Jacques Quisquater , Moti Yung , and Elisabeth Oswald . Leakage resilient cryptography in practice . In David Basin, Ueli Maurer, Ahmad-Reza Sadeghi, and David Naccache, editors, Towards Hardware-Intrinsic Security, Information Security and Cryptography , pages 99 -- 134 . Springer Berlin Heidelberg , 2010 . Francois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, and Elisabeth Oswald. Leakage resilient cryptography in practice. In David Basin, Ueli Maurer, Ahmad-Reza Sadeghi, and David Naccache, editors, Towards Hardware-Intrinsic Security, Information Security and Cryptography, pages 99--134. Springer Berlin Heidelberg, 2010."},{"key":"e_1_3_2_1_38_1","unstructured":"Allan Tomlinson. Introduction to the TPM. http:\/\/courses.cs.vt.edu\/cs5204\/fall10-kafura-BB\/Papers\/TPM\/Intro-TPM-2.pdf.  Allan Tomlinson. Introduction to the TPM. http:\/\/courses.cs.vt.edu\/cs5204\/fall10-kafura-BB\/Papers\/TPM\/Intro-TPM-2.pdf."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_40_1","volume-title":"http:\/\/www.spinics.net\/lists\/crypto\/msg04668.html","author":"Zidlicky Richard","year":"2008","unstructured":"Richard Zidlicky . http:\/\/www.spinics.net\/lists\/crypto\/msg04668.html , 2008 . Richard Zidlicky. http:\/\/www.spinics.net\/lists\/crypto\/msg04668.html, 2008."}],"event":{"name":"ACSAC '11: Annual Computer Security Applications Conference","location":"Orlando Florida USA","acronym":"ACSAC '11","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 27th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076743","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2076732.2076743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:45Z","timestamp":1750240485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076743"}},"subtitle":["a software-based solution to the cold boot attack on disk encryption"],"short-title":[],"issued":{"date-parts":[[2011,12,5]]},"references-count":38,"alternative-id":["10.1145\/2076732.2076743","10.1145\/2076732"],"URL":"https:\/\/doi.org\/10.1145\/2076732.2076743","relation":{},"subject":[],"published":{"date-parts":[[2011,12,5]]},"assertion":[{"value":"2011-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}