Главная
Study mode:
on
1
Intro
2
Clockscrew
3
VFS
4
TrustZone
5
Intel
6
Tools
7
Writing the code
8
How does it work
9
Rowhammer failed
10
AES
11
Plundervolt
12
Thunderbolt
13
QA
14
Is it practical
15
Hardware
16
Questions
17
Memory Access
18
Microcode update
19
Secure Enclave
20
Remote exploit
Description:
Explore the Plundervolt attack, a software-based fault attack primitive that exploits privileged interfaces to undermine system security by manipulating processor frequency and voltage. Learn how this technique can be used to recover cryptographic keys and induce memory safety vulnerabilities in Intel SGX enclaves. Discover the implications of this vulnerability (CVE-2019-11157), its comparison to Rowhammer, and the challenges in mitigating such attacks. Gain insights into the research process, real-world attack scenarios, and the potential impact on trusted computing environments.

Plundervolt - Flipping Bits from Software Without Rowhammer

media.ccc.de
Add to list
0:00 / 0:00