Rowhammer
2015-03-10 00:17:31.115789+01 by
Dan Lyke
0 comments
Exploiting the DRAM rowhammer bug to gain kernel privileges.
We tested a selection of x86 laptops that were readily available to us (all with non-ECC memory) using CLFLUSH with the random address selection approach above. We found that a large subset of these machines exhibited rowhammer-induced bit flips. The results are shown in the table below.
More reason to fear your computer... And to spring for ECC RAM on your servers.
[ related topics:
Furniture
]
comments in ascending chronological order (reverse):
Comment policy
We will not edit your comments. However, we may delete your
comments, or cause them to be hidden behind another link, if we feel
they detract from the conversation. Commercial plugs are fine,
if they are relevant to the conversation, and if you don't
try to pretend to be a consumer. Annoying endorsements will be deleted
if you're lucky, if you're not a whole bunch of people smarter and
more articulate than you will ridicule you, and we will leave
such ridicule in place.
Flutterby™ is a trademark claimed by
Dan Lyke for the web publications at www.flutterby.com and www.flutterby.net.