Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security IT

Time Machines, Computer Memory, and Brute Force Attacks Against Smartcards 49

An anonymous reader writes "IEEE Spectrum reports on a method that exploits the decaying contents of unpowered computer memory to create an hourglass-like 'time machine' that rate limits brute force attacks against contactless smartcards and RFIDs. The paper takes an odd twist on the 'cold boot' attack reported four years ago at USENIX Security. Not quite as cool as a hot tub time machine though. " Full paper (PDF).
This discussion has been archived. No new comments can be posted.

Time Machines, Computer Memory, and Brute Force Attacks Against Smartcards

Comments Filter:
  • What? (Score:5, Insightful)

    by jhoegl ( 638955 ) on Monday August 06, 2012 @10:26PM (#40901457)
    Why do I have to decrypt the summary?
  • by Anonymous Coward on Tuesday August 07, 2012 @02:09AM (#40902461)

    Unlike your top of line PC, there are a lot of constraints on an embedded chip especially one that cost pennies, can run on energy from the RF near field and amount of computation. Unlike white board software, this is real world Engineering where there is a trade-off between constraints/requirement/economic/physical that are opposite to each other. So might want to not mouth off without knowing the subject.

    The chip is also highly observable and a lot of information can be deduced from the amount of time for the processing and power profile during execution.

Today is a good day for information-gathering. Read someone else's mail file.

Working...