<s>
Data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
is	O
an	O
information	B-General_Concept
technology	I-General_Concept
term	O
referring	O
to	O
active	O
data	O
which	O
is	O
stored	O
in	O
a	O
non-persistent	O
digital	O
state	O
typically	O
in	O
computer	O
random-access	B-Architecture
memory	I-Architecture
(	O
RAM	B-Architecture
)	O
,	O
CPU	B-General_Concept
caches	I-General_Concept
,	O
or	O
CPU	B-General_Concept
registers	I-General_Concept
.	O
</s>
<s>
Scranton	O
,	O
PA	O
data	O
scientist	O
Daniel	O
Allen	O
in	O
1996	O
proposed	O
Data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
as	O
a	O
complement	O
to	O
the	O
terms	O
data	B-General_Concept
in	I-General_Concept
transit	I-General_Concept
and	O
data	B-General_Concept
at	I-General_Concept
rest	I-General_Concept
which	O
together	O
define	O
the	O
three	O
states	O
of	O
digital	B-General_Concept
data	I-General_Concept
.	O
</s>
<s>
Data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
refers	O
to	O
data	O
in	O
computer	O
memory	O
.	O
</s>
<s>
Some	O
cloud	O
software	B-Architecture
as	I-Architecture
a	I-Architecture
service	I-Architecture
(	O
SaaS	B-Architecture
)	O
providers	O
refer	O
to	O
data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
as	O
any	O
data	O
currently	O
being	O
processed	O
by	O
applications	O
,	O
as	O
the	O
CPU	O
and	O
memory	O
are	O
utilized	O
.	O
</s>
<s>
Because	O
of	O
its	O
nature	O
,	O
data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
is	O
of	O
increasing	O
concern	O
to	O
businesses	O
,	O
government	O
agencies	O
and	O
other	O
institutions	O
.	O
</s>
<s>
Data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
,	O
or	O
memory	O
,	O
can	O
contain	O
sensitive	O
data	O
including	O
digital	O
certificates	O
,	O
encryption	O
keys	O
,	O
intellectual	O
property	O
(	O
software	O
algorithms	O
,	O
design	O
data	O
)	O
,	O
and	O
personally	O
identifiable	O
information	O
.	O
</s>
<s>
Compromising	O
data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
enables	O
access	O
to	O
encrypted	O
data	B-General_Concept
at	I-General_Concept
rest	I-General_Concept
and	O
data	B-General_Concept
in	I-General_Concept
motion	I-General_Concept
.	O
</s>
<s>
For	O
example	O
,	O
someone	O
with	O
access	O
to	O
random	B-Architecture
access	I-Architecture
memory	I-Architecture
can	O
parse	O
that	O
memory	O
to	O
locate	O
the	O
encryption	O
key	O
for	O
data	B-General_Concept
at	I-General_Concept
rest	I-General_Concept
.	O
</s>
<s>
Once	O
they	O
have	O
obtained	O
that	O
encryption	O
key	O
,	O
they	O
can	O
decrypt	O
encrypted	O
data	B-General_Concept
at	I-General_Concept
rest	I-General_Concept
.	O
</s>
<s>
Threats	O
to	O
data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
can	O
come	O
in	O
the	O
form	O
of	O
cold	O
boot	O
attacks	O
,	O
malicious	O
hardware	O
devices	O
,	O
rootkits	O
and	O
bootkits	O
.	O
</s>
<s>
Encryption	O
,	O
which	O
prevents	O
data	O
visibility	O
in	O
the	O
event	O
of	O
its	O
unauthorized	O
access	O
or	O
theft	O
,	O
is	O
commonly	O
used	O
to	O
protect	O
Data	B-General_Concept
in	I-General_Concept
Motion	I-General_Concept
and	O
Data	B-General_Concept
at	I-General_Concept
Rest	I-General_Concept
and	O
increasingly	O
recognized	O
as	O
an	O
optimal	O
method	O
for	O
protecting	O
Data	B-General_Concept
in	I-General_Concept
Use	I-General_Concept
.	O
</s>
<s>
Microsoft	O
Xbox	B-Protocol
systems	O
are	O
designed	O
to	O
provide	O
memory	O
encryption	O
and	O
the	O
company	O
PrivateCore	O
presently	O
has	O
a	O
commercial	O
software	O
product	O
vCage	O
to	O
provide	O
attestation	O
along	O
with	O
full	O
memory	O
encryption	O
for	O
x86	O
servers	O
.	O
</s>
<s>
In	O
that	O
work	O
,	O
an	O
ARM	B-Application
Cortex-A8	I-Application
processor	O
is	O
used	O
as	O
the	O
substrate	O
on	O
which	O
a	O
full	O
memory	O
encryption	O
solution	O
is	O
built	O
.	O
</s>
<s>
Operating	O
system	O
kernel	O
patches	O
such	O
as	O
TRESOR	O
and	O
Loop-Amnesia	O
modify	O
the	O
operating	O
system	O
so	O
that	O
CPU	B-General_Concept
registers	I-General_Concept
can	O
be	O
used	O
to	O
store	O
encryption	O
keys	O
and	O
avoid	O
holding	O
encryption	O
keys	O
in	O
RAM	B-Architecture
.	O
</s>
<s>
While	O
this	O
approach	O
is	O
not	O
general	O
purpose	O
and	O
does	O
not	O
protect	O
all	O
data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
,	O
it	O
does	O
protect	O
against	O
cold	O
boot	O
attacks	O
.	O
</s>
<s>
Encryption	O
keys	O
are	O
held	O
inside	O
the	O
CPU	O
rather	O
than	O
in	O
RAM	B-Architecture
so	O
that	O
data	B-General_Concept
at	I-General_Concept
rest	I-General_Concept
encryption	O
keys	O
are	O
protected	O
against	O
attacks	O
that	O
might	O
compromise	O
encryption	O
keys	O
in	O
memory	O
.	O
</s>
<s>
Enclaves	O
enable	O
an	O
“	O
enclave	O
”	O
to	O
be	O
secured	O
with	O
encryption	O
in	O
RAM	B-Architecture
so	O
that	O
enclave	O
data	O
is	O
encrypted	O
while	O
in	O
RAM	B-Architecture
but	O
available	O
as	O
clear	O
text	O
inside	O
the	O
CPU	O
and	O
CPU	B-General_Concept
cache	I-General_Concept
.	O
</s>
<s>
Several	O
cryptographic	O
tools	O
,	O
including	O
secure	B-Protocol
multi-party	I-Protocol
computation	I-Protocol
and	O
homomorphic	O
encryption	O
,	O
allow	O
for	O
the	O
private	O
computation	O
of	O
data	O
on	O
untrusted	O
systems	O
.	O
</s>
<s>
Data	B-General_Concept
in	I-General_Concept
use	I-General_Concept
could	O
be	O
operated	O
upon	O
while	O
encrypted	O
and	O
never	O
exposed	O
to	O
the	O
system	O
doing	O
the	O
processing	O
.	O
</s>
