Главная
Study mode:
on
1
Intro
2
A Little Background
3
Rawhammer
4
Bypass the CPU cache
5
Select the Aggressor Rows
6
Rowhammer Exploitation
7
Hammering a Needle in the Software Stack
8
A Quick Google Search
9
Arrival at Santa Barbara
10
Benchmarking DRAM Bandwidth
11
Kernel Module
12
A piece of art: meh.cc
13
Debug, Hammer, Debug
14
E-Mail From The Bos
15
Flipping Bits On The Beach
16
Downward Spiral
17
The cacheflush System Call
18
Pointer Chasing
19
Flipping Bits By Executing Code
20
Cache Maintenance Operations
21
Martina
22
Memory templating
23
Scientific Value
24
Land sensitive data
25
a. Exhaust Large Chunks
26
b. Find a Bit Flip
27
Release Vulnerable Chunk
28
Exhaust Rows (again)
29
a. Release Vulnerable Row
30
b. Release Large Chunks
31
Allocate Pages until we hit the vulnerable now
32
Padding
33
Map a Page Table
34
Evaluation
35
Wrapping Up
36
Disclosure
37
Drammer
Description:
Explore the technical journey behind Drammer, the first Android root exploit leveraging the Rowhammer hardware vulnerability, in this 57-minute conference talk from Hack In The Box Security Conference. Delve into the challenges faced during development, including attempts to flip bits on Android/ARM devices and the near-miss of writing a negative results paper. Learn about the Flip Feng Shui exploitation technique and its application in mobile environments. Gain insights into the research process, from initial experiments to the final implementation, covering topics such as CPU cache bypassing, DRAM benchmarking, and memory templating. Understand the scientific value of Drammer and its wider impact on mobile device security. Follow the presenter's path from Santa Barbara to the beaches, exploring various approaches to achieve reliable exploitation without relying on fancy memory management features.

Drammer - The Making Of

Hack In The Box Security Conference
Add to list
0:00 / 0:00