When a computer is stolen, the real loss is not the hardware β it's the data. This article provides an exhaustive, up-to-date risk assessment of common security configurations, integrating the latest attack vectors (Cold Boot, DMA, SED bypasses, Secure Boot flaws, biometric injection) and actionable mitigations validated by 2025-2026 research.
| Abbreviation | Full meaning |
|---|---|
| BIOS Pwd | BIOS Password β Supervisor (protects settings) + Boot (required at every startup) |
| Boot Ext. | External Boot disabled β USB, DVD, and network boot blocked in BIOS |
| GRUB | Grand Unified Bootloader β Linux boot manager, password-protected |
| Soft. Enc. | Software Encryption β BitLocker (Windows) or LUKS (Linux) |
| TPM PIN | Trusted Platform Module + Startup PIN β prevents automatic disk unlocking |
| ShutD | Shutdown only β no Sleep, no Hibernate, RAM fully cleared at power-off |
| SED+PSID | Self-Encrypting Drive + Physical Security ID printed on the drive label |
| MFA | Multi-Factor Authentication β biometric + strong password combined |
| TB/PCIe off | Thunderbolt and PCIe ports disabled in BIOS β removes direct DMA attack vector |
| IOMMU | Input-Output Memory Management Unit β Intel VT-d / AMD-Vi, blocks DMA attacks |
Cell values
| Symbol | Meaning |
|---|---|
| β | Control active / enabled |
| β * | Control active β see comment (*) below the table |
| β | Control not active / disabled |
| β* | Control not active β see comment (*) below the table |
| β | Not applicable for this configuration |
Risk levels (Risk column)
| Symbol | Risk level |
|---|---|
| π₯ | Extreme β no meaningful protection |
| π§ | High β easily bypassed with basic tools |
| π¨ | Moderate β significant attack vectors remain |
| π© L | Low β good protection for most threats |
| π© VL | Low β Very Low / Very Low β strong configuration |
| π© VL+ | Very Low+ β strong configuration with port hardening |
| π© XL | Extremely Low β all controls active and verified |
Note column icons
| Icon | Meaning |
|---|---|
| π | Password added (BIOS, GRUB, or login) |
| π« | External boot disabled (USB / DVD / network) |
| π | Software encryption enabled (BitLocker / LUKS) |
| π | TPM Startup PIN added |
| π | Shutdown only β no Sleep, no Hibernate |
| π | Hardware-encrypted SSD (SED) enabled |
| π | PSID β Physical Security ID added to SED |
| ποΈ+π | MFA β Biometric + strong password |
| ποΈ | Biometric-only β no password fallback |
| β‘ | Thunderbolt / PCIe ports disabled in BIOS |
| π‘οΈ | IO/MMU enabled and verified (Intel VT-d / AMD-Vi) |
| π | UEFI + Secure Boot |
| Regression β this configuration raises the risk back up |
We identified 14 vulnerability scenarios, each reflecting a real-world configuration that results primarily from insufficient human security decisions β missing a password here, skipping encryption there, trusting a single factor. Each row adds exactly one security measure compared to the previous. Asterisks (*) refer to the comments below the table.
| # | BIOS Pwd | Boot Ext. | GRUB | Soft. Enc. | TPM PIN | ShutD | SED +PSID |
MFA | TB/ PCIe off |
IO MMU |
Risk | Note |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 | β | β | β | β | β | β | β | β | β | β | π₯ | β |
| 2 | β * | β | β | β | β | β | β | β | β | β | π§ | π |
| 3 | β | β | β | β | β | β | β | β | β | β | π¨ | π« |
| 4 | β | β | β | β | β | β | β | β | β | β | π¨ | π |
| 5 | β | β | β | β * | β | β | β | β | β | β | π¨ | π |
| 6 | β | β | β | β | β * | β | β | β | β | β | π© L | π |
| 7 | β | β | β | β | β | β * | β | β | β | β | π© VL | π |
| 8 | β | β | β | β | β | β | β * | β | β | β | π¨ | |
| 9 | β | β | β | β | β | β | β | β | β | β | π© L | π |
| 10 | β | β | β | β | β | β | β | β * | β | β | π© L | ποΈ+π |
| 11 | β | β | β | β | β | β | β | β* | β | β | π¨ | |
| 12 | β | β | β | β | β | β | β | β | β | β | π© VL | π π |
| 13 | β | β | β | β | β | β | β | β | β * | β | π© VL+ | β‘ |
| 14 | β | β | β | β | β | β | β | β | β | β * | π© XL | π‘οΈ |
- *2 : A single BIOS password blocks 94.2% of boot-time attacks (Dell SecureWorks), but does not prevent physical HDD extraction.
- *5 : Software encryption without a Startup PIN leaves the decryption key in RAM. If the device is in Sleep mode, a Cold Boot or Volt Boot attack can extract it.
- *6 : Adding a TPM Startup PIN prevents automatic disk unlocking, but the key remains in RAM while running β DMA or Cold Boot attacks are still possible if the machine is in Sleep.
- *7 : Switching to Shutdown only (no Sleep, no Hibernate) eliminates RAM persistence. This is the best practice for software encryption.
- *8 : Self-Encrypting Drives (SEDs) resist software attacks, but physical attacks exist (Hot Unplug, Forced Restart, Key Capture). Risk goes back to Moderate β this is a regression.
- *10 : Multi-factor authentication (biometric + strong password) resists spoofing and template injection, provided the backup password is strong and unique.
- *11 : Biometric-only is vulnerable: Faceplant attack (template injection into Windows Hello, Black Hat 2025) and Master Prints (up to 65% of fingerprint readers fooled). Never use without a fallback β this is a regression.
- *13 : Disabling Thunderbolt, ExpressCard, or external PCIe ports removes the most direct DMA attack vector. Do this in BIOS if ports are not needed.
- *14 : IOMMU (Intel VT-d / AMD-Vi) must be enabled and verified (e.g.,
dmesg | grep -i iommuon Linux). Many motherboards claim it is active when it is not.
- No protection β π₯ Extreme (case 1)
- + BIOS password β π§ High (case 2)
- + External boot disabled β π¨ Moderate (case 3)
- + GRUB password β π¨ Moderate (case 4)
- + Software encryption (no PIN, sleep on) β π¨ Moderate (case 5)
- + TPM Startup PIN β π© Low (case 6)
- + Shutdown only β π© Low β Very Low (case 7)
- Switch to Hardware SED (no PSID) β π¨ Moderate β regression (case 8)
- + PSID β π© Low (case 9)
- + MFA (biometric + password) β π© Low (case 10)
- Switch to Biometric only β π¨ Moderate β regression (case 11)
- + Software overlay on SED β π© Very Low (case 12)
- + Disable Thunderbolt/PCIe β π© Very Low+ (case 13)
- + IOMMU verified β π© Extremely Low (case 14)
The root of all configurations. Without any encryption layer, only boot-level controls are available. This branch feeds into the global root shared by all three diagrams.
graph TD
root[("Security<br>Configurations")]
root --> branch1["π No encryption<br>(cases 1 to 4)"]
branch1 --> c1["Case 1: π₯ Extreme<br>(nothing)"]
branch1 --> c2["Case 2: π§ High<br>(+BIOS)"]
branch1 --> c3["Case 3: π¨ Moderate<br>(+Boot Ext.)"]
branch1 --> c4["Case 4: π¨ Moderate<br>(+GRUB)"]
style root fill:#1e293b,stroke:#94a3b8,color:#ffffff
style branch1 fill:#7f1d1d,stroke:#fca5a5,color:#ffffff
style c1 fill:#991b1b,stroke:#fca5a5,color:#ffffff
style c2 fill:#7c2d12,stroke:#fdba74,color:#ffffff
style c3 fill:#78350f,stroke:#fcd34d,color:#ffffff
style c4 fill:#78350f,stroke:#fcd34d,color:#ffffff
Same root as Diagram 1. This branch adds a software encryption layer on top of the boot controls. Cases 5 to 7 differ only by whether a TPM PIN and shutdown policy are enforced.
graph TD
root[("Security<br>Configurations")]
root --> branch2["π Software encryption<br>(cases 5 to 7)"]
branch2 --> c5["Case 5: π¨ Moderate<br>(+Soft.Enc, no PIN)"]
branch2 --> c6["Case 6: π© Low<br>(+TPM PIN)"]
branch2 --> c7["Case 7: π© LowβVery Low<br>(+ShutD)"]
style root fill:#1e293b,stroke:#94a3b8,color:#ffffff
style branch2 fill:#14532d,stroke:#86efac,color:#ffffff
style c5 fill:#78350f,stroke:#fcd34d,color:#ffffff
style c6 fill:#166534,stroke:#86efac,color:#ffffff
style c7 fill:#14532d,stroke:#6ee7b7,color:#ffffff
Same root as Diagrams 1 and 2. This branch replaces or overlays software encryption with hardware SED. Two regressions appear (Cases 8 and 11) β adding a control in the wrong way raises the risk back up.
graph TD
root[("Security<br>Configurations")]
root --> branch3["πΎ Hardware SED encryption<br>(cases 8 to 14)"]
branch3 --> sub3_1["SED without PSID<br>(case 8)"]
sub3_1 --> c8["Case 8: π¨ Moderate<br>(regression β hardware attacks)"]
branch3 --> sub3_2["SED + PSID<br>(cases 9 to 11)"]
sub3_2 --> c9["Case 9: π© Low<br>(+PSID)"]
sub3_2 --> c10["Case 10: π© Low<br>(+MFA)"]
sub3_2 --> c11["Case 11: π¨ Moderate<br>(biometric only β regression)"]
branch3 --> sub3_3["SED + PSID + software overlay<br>(cases 12 to 14)"]
sub3_3 --> c12["Case 12: π© Very Low<br>(+software overlay)"]
sub3_3 --> c13["Case 13: π© Very Low+<br>(+TB/PCIe off)"]
sub3_3 --> c14["Case 14: π© Extremely Low<br>(+IOMMU verified)"]
style root fill:#1e293b,stroke:#94a3b8,color:#ffffff
style branch3 fill:#1e3a5f,stroke:#93c5fd,color:#ffffff
style sub3_1 fill:#1e40af,stroke:#93c5fd,color:#ffffff
style sub3_2 fill:#1e40af,stroke:#93c5fd,color:#ffffff
style sub3_3 fill:#1e40af,stroke:#93c5fd,color:#ffffff
style c8 fill:#78350f,stroke:#fcd34d,color:#ffffff
style c9 fill:#166534,stroke:#86efac,color:#ffffff
style c10 fill:#166534,stroke:#86efac,color:#ffffff
style c11 fill:#78350f,stroke:#fcd34d,color:#ffffff
style c12 fill:#14532d,stroke:#6ee7b7,color:#ffffff
style c13 fill:#064e3b,stroke:#6ee7b7,color:#ffffff
style c14 fill:#022c22,stroke:#34d399,color:#ffffff
These are specific, actionable measures that complement the matrix.
- Supervisor password β prevents changes to BIOS settings.
- Boot password β required at every startup.
- Always disable external boot (USB, DVD, network) even if you have a password.
Set a GRUB password to prevent editing boot parameters (init=/bin/bash). Secure the config file β only root can read/write:
sudo chmod 600 /boot/grub/grub.cfg
β οΈ Rolling distributions (openSUSE Tumbleweed, Arch): every kernel update regeneratesgrub.cfgautomatically, which overwrites any password set directly in that file. On rolling systems, the GRUB password must be configured via/etc/grub.d/(e.g., a custom40_customscript) so it survives regeneration. Failing to do this means the password silently disappears after the next kernel update β a false sense of security. Weigh this maintenance overhead before enabling GRUB passwords on rolling systems.
The file hiberfil.sys stores RAM contents (including encryption keys) on disk. If an attacker extracts your disk, they can analyse it offline.
Disable hibernation on sensitive devices:
powercfg /h off- BitLocker: Enable TPM + Startup PIN (not just TPM alone).
- Linux LUKS: Bind to TPM using
systemd-cryptenroll:
sudo systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=0+7 /dev/sdaXEncrypt the entire drive β including temp and swap partitions.
- PSID is printed on the drive label β an attacker with physical access can read it and perform a cryptographic erase (data loss, not leak).
- Known hardware attacks: Hot Unplug, Forced Restart, Key Capture.
- Recommendation: combine SED with software encryption (BitLocker over SED) for defence-in-depth.
Many motherboards claim DMA protection is enabled but IOMMU is not initialised.
Verify on Linux:
dmesg | grep -i iommu
cat /proc/cmdline | grep iommuLook for intel_iommu=on or amd_iommu=on.
Verify on Windows:
Get-Service -Name "DmaProtection"Disable unused Thunderbolt/PCIe ports in BIOS.
- Faceplant (Black Hat 2025): A local admin can inject their own biometric template into Windows Hello.
- Master prints can fool up to 65% of fingerprint readers.
- Always pair biometrics with a strong password or PIN.
- Store recovery keys offline (printed, in a safe) β not only in your Microsoft account.
Secure Boot has been bypassed multiple times in 2025-2026:
- CVE-2025-4275 ("Hydroph0bia") β Insyde H2O
- CVE-2026-0421 β Lenovo ThinkPad
- CVE-2026-21265 β Expired Microsoft certificates
Enable automatic firmware updates or check your vendor's site monthly.
"The simple presence of a BIOS password blocks 94.2% of theft attempts based on boot-time attacks." β Dell SecureWorks
- Enable full-disk encryption β BitLocker (TPM + Startup PIN) or LUKS (with TPM).
- Set both Supervisor and Boot passwords in BIOS/UEFI, and disable external boot.
- Disable Sleep β use Shutdown or Hibernate only. On high-security devices, disable hibernation as well.
- Add a GRUB password on Linux, and
chmod 600its config file. - Never rely solely on biometrics β always combine with a password.
- Disable Thunderbolt/PCIe ports if not needed, or enable and verify Kernel DMA Protection.
- Store BitLocker recovery keys offline β printed, kept in a safe.
- Keep BIOS/UEFI firmware updated β check monthly.
| CVE / Attack | Description | Impact |
|---|---|---|
| CVE-2025-4275 | Secure Boot bypass β Insyde H2O | Bootkit installation |
| CVE-2025-48818 | BitLocker encryption bypass | Data exposure |
| CVE-2026-0421 | Lenovo ThinkPad β disable Secure Boot silently | Firmware compromise |
| CVE-2026-21265 | Expired Microsoft Secure Boot certificates | Local bypass |
| Faceplant (2025) | Biometric template injection β Windows Hello | Authentication bypass |
| Volt Boot (2025) | Extract data from on-chip SRAM via power domains | Key theft |
| Hot Unplug / Forced Restart | SED hardware bypasses | Data access without password |
No single measure makes your data safe when a device is stolen. Layering is the only effective strategy.
- Most users: Software encryption + Startup PIN + shutdown + strong password = π© Low β Very Low risk.
- High-risk environments: SED + PSID + software overlay + MFA + shutdown + disabled Thunderbolt + verified IOMMU = π© Extremely Low risk.
"Security is a journey, not a product." β Keep your firmware updated, re-evaluate yearly, and always assume physical access is game over β but make that game as hard as possible.
Figure 1: Layered security approach (BIOS, Encryption, Authentication)
References: Princeton Cold Boot, KPMG SED attacks, CVE databases, Black Hat 2025, ACM 2025, Dell SecureWorks.