Lucene search

K
myhack58佚名MYHACK58:62201559882
HistoryMar 13, 2015 - 12:00 a.m.

DRAM chip kernel mention the right vulnerability analysis-vulnerability warning-the black bar safety net

2015-03-1300:00:00
佚名
www.myhack58.com
16

Security researchers found in the Intel PC on Linux systems you can use certain types of DDR DRAM chips in the presence of physical defects to obtain the highest system privileges.

This technique is known as“Rowhammer”, which may make the recent generation of DRAM chips times the memory access leads to the adjacent line occurs“bit flip”and allows any person to change the computer’s memory of stored content.

What is Rowhammer it?

DDR memory data rows and columns of the array arrangement, and then assigned to various servers, applications, and large-scaleOS. In order to prevent the application between each other to access memory through the“sandbox”will they be isolated.

But the“sandbox”by some malicious software to store a second portion of the need for repeated access to adjacent rows of content using the bit-flipping technique to bypass. Therefore, the attack of the two adjacent memory Regions is likely to lead to charge leakage or other parts causing interference.

The researchers explained:

“There is enough traffic you can make 0 to 1 or 1 to 0 changes, in other words the selection of the zero region is likely to transfer to the victim”

Bit flip technique for the first time appeared in Carnegie Mellon University published an academic study, the report called

The Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors on

[1] [2] [3] next