Our website is made possible by displaying online advertisements to our visitors.

Please consider supporting us by disabling your ad blocker.
Sign in to follow this  
Followers 0
Fourth echelon

Rowhammer: A new JavaScript attack that targets DRAM

1 post in this topic

Most of the security flaws and problems that get attention in the community are fundamentally software-based. It’s not impossible to find a hardware bug or errata to target, but such attacks are typically an order of magnitude more difficult and rely on your target having a specific make or model of CPU. A hardware attack against Haswell will most likely fail against an Ivy Bridge or AMD CPU, while an attack that succeeds against an ARM chip’s physical design won’t apply to AMD or Intel. There’s a new hardware attack making the rounds, dubbed Rowhammer, that directly targets DRAM — and it’s got the potential to be a major headache in the future.

Here’s how Rowhammer works: Recent research has shown that repeatedly accessing the same memory blocks over and over can cause a bit flip in other DRAM locations. These early attacks, however, required executing native code and relied on special instructions. A recent Chrome patch eliminated support for some of these instructions, which was thought to cause the problem.

http://www.extremetech.com/electronics/211655-rowhammer-a-new-javascript-attack-that-targets-dram

 
 
 

Share this post


Link to post
Share on other sites
Guest
You are commenting as a guest. If you have an account, please sign in.
Reply to this topic...

×   You have pasted content with formatting.   Restore formatting

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

Sign in to follow this  
Followers 0

Our website is made possible by displaying online advertisements to our visitors.

Please consider supporting us by disabling your ad blocker.