Computer memory leaks a turn off

August 11, 2012, Inderscience

When you switch off your computer any passwords you used to login to web pages, your bank or other financial account evaporate into the digital ether, right? Not so fast! Researchers in Greece have discovered a security loophole that exploits the way computer memory works and could be used to harvest passwords and other sensitive data from a PC even if it is in standby mode.

Writing in a forthcoming issue of the International Journal of and Digital Forensics, Christos Georgiadis of the University of Macedonia in Thessaloniki and colleagues Stavroula Karayianni and Vasilios Katos at the Democritus University of Thrace in Xanthi explain how their discovery could be used by information specialists in for retrieving incriminating evidence from computers as well as exploited by criminals to obtain personal data and bank details.

The researchers point out that most users assume that switching off their machine removes any data held in (RAM), this type of fast memory is used by the computer to temporarily hold data currently used by a given application. RAM is often referred to as , because anything contained in RAM is considered lost when a computer is switched off. Indeed, all data is lost from RAM when the power supply is disconnected; so it is volatile in this context.

However, Georgiadis and colleagues have now shown that data held in RAM is not lost if the computer is switched off but the mains not interrupted. They suggest that forensics experts and criminals might thus be able to access data from the most recently used applications. They point out that starting a new memory-intensive application will overwrite data in RAM while a computer is being used, but simply powering off the machine leaves users vulnerable in terms of security and privacy.

"The need to capture and analyse the RAM contents of a suspect PC grows constantly as remote and distributed applications have become popular, and RAM is an important source of evidence," the team explains, as it can contain telltale traces of networks accessed and the unencrypted forms of passwords sent to login boxes and online forms.

The team tested their approach to retrieving data from RAM after a computer had been switched off following a general and common usage scenario involving accessing Facebook, Gmail, Microsoft Network (MSN) and Skype. They carried out dumps immediately after switch off at 5, 15 and 60 minutes. They then used well-known forensic repair tools to piece together the various fragments of data retrieved from the memory dumps.

The team was able to reconstruct login details from the memory dumps for several popular services being used in the Firefox web browser including Google Mail (GMail), Facebook, Hotmail, and the WinRar file compression application. "We can conclude that volatile memory loses data under certain conditions and in a forensic investigation such memory can be a valuable source of evidence," the team says.

Explore further: Upgrading RAM is a simple process

More information: "A framework for password harvesting from volatile memory" in Int. J. Electronic Security and Digital Forensics, 2012, 4, 154-163.

Related Stories

Upgrading RAM is a simple process

September 11, 2009

Question: I'm in the market for a new laptop, and I want to be sure it has four gigabytes of RAM. My friends tell me to buy the cheapest configuration and upgrade the RAM myself. How hard is it to upgrade RAM in a computer?

Recommended for you

Sculpting stable structures in pure liquids

February 21, 2019

Oscillating flow and light pulses can be used to create reconfigurable architecture in liquid crystals. Materials scientists can carefully engineer concerted microfluidic flows and localized optothermal fields to achieve ...

Researchers make coldest quantum gas of molecules

February 21, 2019

JILA researchers have made a long-lived, record-cold gas of molecules that follow the wave patterns of quantum mechanics instead of the strictly particle nature of ordinary classical physics. The creation of this gas boosts ...


Adjust slider to filter visible comments by rank

Display comments: newest first

Laptop Repair Data
Aug 11, 2012
This comment has been removed by a moderator.
Aug 11, 2012
This comment has been removed by a moderator.
1 / 5 (2) Aug 12, 2012
Not sure how this is news - this type of vulnerability has been known for some time (look up "cold boot attack"). People have even used liquid nitrogen to retain useful data on DRAM for up to a week without refresh...
1 / 5 (1) Aug 13, 2012
Ok, keep all your cpu and peripherals on a zip strip with a switch. When you turn off the pooter, turn off the hard switch on it too. then turn off ALL the peripherals. then turn off the zip strip, unplug it and put a jumper across the ends of the plug

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.