In this paper, we will provide an overview of the current state-of-the-art with regards to so-called cold boot attacks, their practical applicability and feasibility, potential counter-measures and their effectiveness.
more here...........http://arxiv.org/ftp/arxiv/papers/1408/1408.0725.pdf
more here...........http://arxiv.org/ftp/arxiv/papers/1408/1408.0725.pdf