185k views
5 votes
In 2008, researchers at Princeton University demonstrated techniques to retrieve RAM contents after the computer had been powered off. They then extracted drive encryption keys from RAM and used them to decrypt an encrypted drive. This is called a(n):

User Tresha
by
3.2k points

1 Answer

6 votes

It’s called a “Cold Boot” attack
User Edward Louth
by
3.0k points