-
Notifications
You must be signed in to change notification settings - Fork 24
Description
"on hardware wallets, one of the incomplete but helpful defense mechanisms is that an early part of the boot (bootloader) wipes some or all of the unused volatile memory before giving control to some firmware component. This way, even if the newly loaded firmware is malicious or buggy and the previously loaded firmware left something important in RAM, there's a good chance that it's wiped before it can get leaked. This is relevant since power of the embedded devices can be pulled at any moment, so this is a common scenario."
"For QuorumOS, a similar concept may help in cases where the attacker can e.g., "only" get control or find a memory leak vulnerability in a rebooted state after a previous panic, unexpected shutdown or other error condition. In that case, wiping the initial memory just in case could avoid practical impacts." ... "Also, it's likely the AWS Nitro VMs already have a thoroughly cleared memory on any logical restart since this is an obvious security problem otherwise. Still, I thought this is worth mentioning concept-wise." (@cr-tk)
ref: #122