Главная
Study mode:
on
1
Intro
2
About this presentation
3
Take aways
4
From code to capacitor
5
Why translation
6
Address translation on x86-64
7
Virtual and physical addressing
8
Road block: Data Caches
9
Bypass cache road block
10
How does physical addresses map to memory
11
DRAM organization
12
First hint of trouble
13
The Row buffer
14
How reading from DRAM works
15
We can measure a difference
16
Summary
17
Remember this?
18
Reversing the mapping function - Approach
19
Imagine this code
20
Spying
21
Two related questions
22
How our demo really works
23
Attacks
24
Scenario
25
The solution
26
The gory details - bits
27
The gory details - Packets
28
Rowhammer
29
Finding rows
30
DDR4 Row hammer
31
Black Hat Sound Bytes
Description:
Explore a critical security vulnerability in DRAM architecture common to computers and various devices in this Black Hat conference talk. Delve into the research revealing how DRAM design creates an attack surface for side channel attacks, largely independent of software flaws, operating systems, virtualization technology, and CPU. Understand the role of the row buffer in DRAM modules and how it can be exploited. Learn about address translation, physical addressing, and DRAM organization. Discover techniques for bypassing data caches and measuring differences in DRAM access. Examine the process of reversing mapping functions and spying on memory. Investigate practical attack scenarios, potential solutions, and the intricacies of DRAM packets. Explore the concept of Rowhammer attacks, including their application to DDR4 memory. Gain valuable insights into this critical security issue and its implications for modern computing systems.

How Your DRAM Becomes a Security Problem

Black Hat
Add to list
0:00 / 0:00