{"id":34297,"date":"2021-11-26T15:00:55","date_gmt":"2021-11-26T20:00:55","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=34297"},"modified":"2021-11-26T15:00:55","modified_gmt":"2021-11-26T20:00:55","slug":"new-rowhammer-techniques","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2021\/11\/26\/new-rowhammer-techniques\/","title":{"rendered":"New Rowhammer Techniques"},"content":{"rendered":"<p><a href=\"https:\/\/therecord.media\/google-says-rowhammer-attacks-are-gaining-range-as-ram-is-getting-smaller\/\">Catalin Cimpanu<\/a> (via <a href=\"https:\/\/news.ycombinator.com\/item?id=27288079\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/therecord.media\/google-says-rowhammer-attacks-are-gaining-range-as-ram-is-getting-smaller\/\"><p>Google says Rowhammer attacks are gaining range as RAM is getting smaller\nA team of Google security researchers said they discovered a new way to perform Rowhammer attacks against computer memory (RAM) cards that broaden the attack&rsquo;s initial impact.<\/p><p>[&#8230;]<\/p><p>Initial Rowhammer attacks targeted RAM DDR3 memory cards, but academics kept researching the topic. In the following years, they also discovered that Rowhammer attacks could also impact <a href=\"http:\/\/www.thirdio.com\/rowhammer.pdf\">RAM DDR4<\/a>, that attacks could be <a href=\"https:\/\/arxiv.org\/abs\/1507.06955v5\">executed via JavaScript code<\/a> loaded on a web page, or even <a href=\"https:\/\/www.vusec.net\/projects\/throwhammer\/\">via network packets<\/a> sent directly to a computer&rsquo;s networking card.<\/p><p>Furthermore, researchers also found that Rowhammer attacks could also be used to <a href=\"https:\/\/rambleed.com\/\">exfiltrate data from the RAM<\/a> (not only alter it) and that attacks could also be accelerated by using locally installed <a href=\"https:\/\/www.vusec.net\/projects\/glitch\/\">GPU<\/a> or <a href=\"https:\/\/arxiv.org\/abs\/1912.11523\">FPGA<\/a> cards.<\/p><p>[&#8230;]<\/p><p>In a new attack variation named <strong>Half-Double<\/strong>, researchers said they managed to carry out a Rowhammer attack that caused bit flips at a distance of two rows from the &ldquo;hammered&rdquo; row instead of just one.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/comsec.ethz.ch\/research\/dram\/blacksmith\/\">Computer Security Group<\/a> (via <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2021\/11\/new-rowhammer-technique.html\">Bruce Schneier<\/a>):<\/p>\n<blockquote cite=\"https:\/\/comsec.ethz.ch\/research\/dram\/blacksmith\/\"><p>We demonstrate that it is possible to trigger Rowhammer bit flips on all DRAM devices today despite deployed mitigations on commodity off-the-shelf systems with little effort.<\/p><p>[&#8230;]<\/p><p>As the search space of non-uniform patterns is huge, we conducted a series of further experiments to determine the structure of patterns that effectively bypass TRR. Our experiments showed that the <em>order<\/em>, <em>regularity,<\/em> and <em>intensity<\/em> of accessing aggressor rows in non-uniform patterns are essential. We noticed that our observations nicely match with common parameters of the frequency domain, namely <em>frequency<\/em>, <em>phase<\/em>, and <em>amplitude<\/em>. We used these parameters to design <em>frequency-based<\/em> Rowhammer patterns that can effectively explore the space of non-uniform patterns. We implemented these patterns in a black-box fuzzer named Blacksmith that determines suitable parameter values crafting effective patterns targeting a specific device.<\/p><\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2015\/04\/01\/exploiting-the-dram-rowhammer-bug-to-gain-kernel-privileges\/\">Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Catalin Cimpanu (via Hacker News): Google says Rowhammer attacks are gaining range as RAM is getting smaller A team of Google security researchers said they discovered a new way to perform Rowhammer attacks against computer memory (RAM) cards that broaden the attack&rsquo;s initial impact.[&#8230;]Initial Rowhammer attacks targeted RAM DDR3 memory cards, but academics kept researching [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2021-11-26T20:00:58Z","apple_news_api_id":"a1eb40ed-56b9-4b2a-a7b1-923fe613e8cb","apple_news_api_modified_at":"2021-11-26T20:00:58Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/AoetA7Va5SyqnsZI_5hPoyw","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[448,30,1056,48,219],"class_list":["post-34297","post","type-post","status-publish","format-standard","hentry","category-technology","tag-linux","tag-mac","tag-ram","tag-security","tag-windows"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/34297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=34297"}],"version-history":[{"count":1,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/34297\/revisions"}],"predecessor-version":[{"id":34298,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/34297\/revisions\/34298"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=34297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=34297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=34297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}