Rowhammer an incredible assault for a few

The data theft technique called “Rowhammer” has both alarmed and fascinated the community in cyberspace because it combines digital and physical hacking in ways that are very exciting and incalculable.

From the discovery of the attack until today, the they study it and try to identify the targets it can successfully attack. After a first investigation their findings are very disturbing. Rowhammer

They discovered that the scope of a Rowhammer attack can be much larger than they thought, as it can affect everything from servers to routers and which until today we considered safe.

Below we will try to explain the attack as simply as possible.

Rowhammer attacks are very technical.

They involve a strategic execution of a program over and over again in a "series" of transistors on a computer's memory chip. The idea is to "forge" this series, until electricity begins to leak into the next series.
This can cause problems in προορισμού και να προκαλέσει αναστροφές ενέργειας από την μια θέση στην άλλη, αλλάζοντας ελαφρώς τα δεδομένα που είναι αποθηκευμένα στη μνήμη. Ένας εξειδικευμένος εισβολέας Rowhammer μπορεί στη συνέχεια να αρχίσει να εκμεταλλεύεται αυτές τις μικροσκοπικές αλλαγές δεδομένων για να αποκτήσει πρόσβαση στο σύστημα.

Researchers initially believed that a Rowhammer attack affected the standard random access memory used on many computers. But it turned out that the Rowhammer attack threatens memory on Android phones as well. On Wednesday, however, researchers from the VUSec team at the Vrije Universiteit in Amsterdam released details of a next-generation Rowhammer attack that could target what is known as "error-correcting code memory."

ECC memory was thought to complicate Rowhammer attacks because it had self-correction mechanisms that deal with the data corruption caused by the attack. It is worth mentioning that ECC memory is used in systems that need exceptional reliability and can not tolerate inaccuracies, such as systems for financial platforms.

The researchers note that the ECC memory could not stop these attacks.

Those interested in learning more about the attack can read it paper published by the researchers.

_____________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).