I wrote a paper with a countermeasure for a cold-boot attack and am currently in rebuttal process.
One reviewer struggles with the motivation behind cold-boot attacks. Specifically, he asks if there is an example of a cold-boot attack used in the real-world.
To answer him, I searched for forensic companies which use the cold-boot attack, but it was not easy to find.
Are there forensic companies or forensic examples that use the cold-boot attack?