Rowhammer an incredible assault for a few

Η ς δεδομένων που ονομάζεται “Rowhammer” έχει ανησυχήσει αλλά και γοητεύσει την κοινότητα ασφαλείας στον κυβερνοχώρο, επειδή συνδυάζει την ψηφιακή και τη φυσική παραβίαση με τρόπους πολύ συναρπαστικούς και ανυπολόγιστους.

From the discovery of the attack until today, researchers have been studying it and trying to determine the targets it can successfully attack. After a first investigation, their findings are very worrying. Rowhammer

They discovered that the range of a Rowhammer attack could be much larger than they expected, as it could affect servers to routers as well as hardware that until now we considered safe.

Below we will try to explain the attack as simply as possible.

Rowhammer attacks are very technical.

They involve a strategic execution of a program over and over again in a "series" of transistors on a computer's memory chip. The idea is to "forge" this series, until electricity begins to leak into the next series.
Αυτή η διαρροή μπορεί να προκαλέσει στη γραμμή προορισμού και να προκαλέσει αναστροφές ενέργειας από την μια θέση στην άλλη, αλλάζοντας ελαφρώς τα που είναι αποθηκευμένα στη μνήμη. Ένας εξειδικευμένος εισβολέας Rowhammer μπορεί στη συνέχεια να αρχίσει να εκμεταλλεύεται αυτές τις μικροσκοπικές αλλαγές δεδομένων για να αποκτήσει πρόσβαση στο σύστημα.

Initially researchers believed that a Rowhammer attack affects standard random access memory that ται σε πολλούς υπολογιστές. Όμως αποδείχθηκε ότι η επίθεση Rowhammer απειλεί τη μνήμη και στα Android. Την Τετάρτη, ωστόσο, οι ερευνητές της ς VUSec από το Vrije Universiteit του Άμστερνταμ δημοσίευσαν λεπτομέρειες για μια επίθεση Rowhammer της επόμενης γενιάς που μπορεί να στοχεύσει σε αυτό που είναι γνωστό σαν μνήμη “κώδικα διόρθωσης σφαλμάτων” (error-correcting code memory).

ECC memory was thought to complicate Rowhammer attacks because it had self-correction mechanisms that deal with the data corruption caused by the attack. It is worth mentioning that ECC memory is used in systems that need exceptional reliability and can not tolerate inaccuracies, such as systems for financial platforms.

The researchers note that the ECC memory could not stop these attacks.

Those interested in learning more about the attack can read it paper published by the researchers.

_____________________ The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).