Главная
Study mode:
on
1
Intro
2
How reading from DRAM works
3
Timing difference
4
How widespread is the issue?
5
Requirements
6
Access techniques
7
Physical addresses and DRAM
8
How to exploit random bit flips?
9
Strategy: Modify instructions
10
Page Table Entries
11
Page Table Manipulation
12
Post-Rowhammer Exploitation
13
Bit Flips + Page Deduplication
14
Mitigations
15
What about ECC?
16
Preventing Rowhammer attacks in hardware (1/3)
17
Preventing Rowhammer attacks in software
18
Detecting Rowhammer attacks
19
Defenses Overview
20
How to hammer?
21
Single-sided hammering
22
Double-sided hammering
23
Hammering techniques
24
One-location hammering
25
Memory-Controller Policies
26
How well does it work?
27
Opcode Flipping - Conditional Jump
28
Page Cache
29
Memory Waylaying
30
SGX Encrypted Memory
31
(Ab)using SGX Protection
32
Just comparing some performance numbers...
33
Exploiting Nethammer Bit Flips
Description:
Explore the Rowhammer bug, a critical vulnerability in DRAM modules, through this 50-minute Black Hat conference talk. Delve into the mechanics of DRAM reading, timing differences, and the widespread nature of this issue. Learn about access techniques, physical addresses, and exploitation strategies, including modifying instructions and manipulating page tables. Examine post-Rowhammer exploitation methods, such as bit flips combined with page deduplication. Investigate various mitigation techniques, including hardware and software prevention methods, as well as detection strategies. Gain insights into different hammering techniques like single-sided, double-sided, and one-location hammering. Explore advanced topics such as opcode flipping, memory waylaying, and SGX encrypted memory exploitation. Compare performance numbers and understand the implications of Nethammer bit flips in this comprehensive exploration of DRAM security vulnerabilities.

Another Flip in the Row

Black Hat
Add to list