词条 | Row hammer | ||
释义 |
The row hammer effect has been used in some privilege escalation computer security exploits,[2][4][5][6] and network-based attacks are also theoretically possible in a fast network connection between the attacker and victim.[7][8] Different hardware-based techniques exist to prevent the row hammer effect from occurring, including required support in some processors and types of DRAM memory modules.[9][10] Row hammer rarely or never affects DDR and DDR2 SDRAM modules. It affects many DDR3 and DDR4 SDRAM modules. BackgroundIn dynamic RAM (DRAM), each bit of stored data occupies a separate memory cell that is electrically implemented with one capacitor and one transistor. The charge state of a capacitor (charged or discharged) is what determines whether a DRAM cell stores "1" or "0" as a binary value. Huge numbers of DRAM memory cells are packed into integrated circuits, together with some additional logic that organises the cells for the purposes of reading, writing, and refreshing the data.[11][12] Memory cells (blue squares in the illustration) are further organised into matrices and addressed through rows and columns. A memory address applied to a matrix is broken into the row address and column address, which are processed by the row and column address decoders (in the illustration, vertical and horizontal green rectangles, respectively). After a row address selects the row for a read operation (the selection is also known as row activation), bits from all cells in the row are transferred into the sense amplifiers that form the row buffer (red squares in the illustration), from which the exact bit is selected using the column address. Consequently, read operations are of a destructive nature because the design of DRAM requires memory cells to be rewritten after their values have been read by transferring the cell charges into the row buffer. Write operations decode the addresses in a similar way, but as a result of the design entire rows must be rewritten for the value of a single bit to be changed.[1]{{rp|2–3}}[11][12][13] As a result of storing data bits using capacitors that have a natural discharge rate, DRAM memory cells lose their state over time and require periodic rewriting of all memory cells, which is a process known as refreshing.[1]{{rp|3}}[11] As another result of the design, DRAM memory is susceptible to random changes in stored data, which are known as soft memory errors and attributed to cosmic rays and other causes. There are different techniques that counteract soft memory errors and improve the reliability of DRAM, of which error-correcting code (ECC) memory and its advanced variants (such as lockstep memory) are most commonly used.[14] {{Anchor|DISTURBANCE|VICTIM|DOUBLE}}OverviewIncreased densities of DRAM integrated circuits (ICs) have led to physically smaller memory cells capable of storing smaller charges, resulting in lower operational noise margins, increased rates of electromagnetic interactions between memory cells, and greater possibility of data loss. As a result, disturbance errors have been observed, being caused by cells interfering with each other's operation and manifesting as random changes in the values of bits stored in affected memory cells. The awareness of disturbance errors dates back to the early 1970s and Intel 1103 as the first commercially available DRAM IC; since then, DRAM manufacturers have employed various mitigation techniques to counteract disturbance errors, such as improving the isolation between cells and performing production testing. However, researchers proved in a 2014 analysis that commercially available DDR3 SDRAM chips manufactured in 2012 and 2013 are susceptible to disturbance errors, while using the term row hammer to name the associated side effect that led to observed bit flips.[1][3][15] The opportunity for the row hammer effect to occur in DDR3 memory[16] is primarily attributed to DDR3's high density of memory cells and the results of associated interactions between the cells, while rapid DRAM row activations have been determined as the primary cause. Frequent row activations cause voltage fluctuations on the associated row selection lines, which have been observed to induce higher-than-natural discharge rates in capacitors belonging to nearby (adjacent, in most cases) memory rows, which are called victim rows; if the affected memory cells are not refreshed before they lose too much charge, disturbance errors occur. Tests show that a disturbance error may be observed after performing around 139,000 subsequent memory row accesses (with cache flushes), and that up to one memory cell in every 1,700 cells may be susceptible. Those tests also show that the rate of disturbance errors is not substantially affected by increased environment temperature, while it depends on the actual contents of DRAM because certain bit patterns result in significantly higher disturbance error rates.[1][2][15][17] A variant called double-sided hammering involves targeted activations of two DRAM rows surrounding a victim row: in the illustration provided in this section, this variant would be activating both yellow rows with the aim of inducing bit flips in the purple row, which in this case would be the victim row. Tests show that this approach may result in a significantly higher rate of disturbance errors, compared to the variant that activates only one of the victim row's neighbouring DRAM rows.[4][18]{{rp|19–20}}[19] {{Anchor|MAC|MAW|TEST|TRR}}MitigationDifferent methods exist for more or less successful detection, prevention, correction or mitigation of the row hammer effect. Tests show that simple ECC solutions, providing single-error correction and double-error detection (SEC DED) capabilities, are not able to correct or detect all observed disturbance errors because some of them include more than two flipped bits per memory word.[1]{{rp|8}}[15]{{rp|32}} Further, flipping three bits prevents ECC from noticing the modification.[20] A more effective solution is to introduce more frequent memory refreshing, with the refresh intervals shorter than the usual 64 ms,{{Efn|Research shows that the rate of disturbance errors in a selection of DDR3 memory modules closes to zero when the memory refresh interval becomes roughly seven times shorter than the default of 64 ms.[15]{{rp|17,26}}}} but this technique results in higher power consumption and increased processing overhead; some vendors provide firmware updates that implement this type of mitigation.[21] One of the more complex prevention measures performs counter-based identification of frequently accessed memory rows and proactively refreshes their neighbouring rows; another method issues additional infrequent random refreshes of memory rows neighbouring the accessed rows regardless of their access frequency. Research shows that these two prevention measures cause negligible performance impacts.[1]{{rp|10–11}}[22] Since the release of Ivy Bridge microarchitecture, Intel Xeon processors support the so-called pseudo target row refresh (pTRR) that can be used in combination with pTRR-compliant DDR3 dual in-line memory modules (DIMMs) to mitigate the row hammer effect by automatically refreshing possible victim rows, with no negative impact on performance or power consumption. When used with DIMMs that are not pTRR-compliant, these Xeon processors by default fall back on performing DRAM refreshes at twice the usual frequency, which results in slightly higher memory access latency and may reduce the memory bandwidth by up to 2–4%.[9] The LPDDR4 mobile memory standard published by JEDEC[23] includes optional hardware support for the so-called target row refresh (TRR) that prevents the row hammer effect without negatively impacting performance or power consumption.[10][24][25] Additionally, some manufacturers implement TRR in their DDR4 products,[26][27] although it is not part of the DDR4 memory standard published by JEDEC.[28] Internally, TRR identifies possible victim rows, by counting the number of row activations and comparing it against predefined chip-specific maximum activate count (MAC) and maximum activate window (tMAW) values, and refreshes these rows to prevent bit flips. The MAC value is the maximum total number of row activations that may be encountered on a particular DRAM row within a time interval that is equal or shorter than the tMAW amount of time before its neighbouring rows are identified as victim rows; TRR may also flag a row as a victim row if the sum of row activations for its two neighbouring rows reaches the MAC limit within the tMAW time window.[23][29] Due to their necessity of huge numbers of rapidly performed DRAM row activations, row hammer exploits issue large numbers of uncached memory accesses that cause cache misses, which can be detected by monitoring the rate of cache misses for unusual peaks using hardware performance counters.[4][30] Version 5.0 of the MemTest86 memory diagnostic software, released on December 3, 2013, added a row hammer test that checks whether computer RAM is susceptible to disturbance errors, but it only works if the computer boots UEFI; without UEFI, it boots an older version with no hammer test.[31] ImplicationsMemory protection, as a way of preventing processes from accessing memory that has not been assigned to each of them, is one of the concepts behind most modern operating systems. By using memory protection in combination with other security-related mechanisms such as protection rings, it is possible to achieve privilege separation between processes, in which programs and computer systems in general are divided into parts limited to the specific privileges they require to perform a particular task. Using privilege separation can also reduce the extent of potential damage caused by computer security attacks by restricting their effects to specific parts of the system.[32][33]Disturbance errors (explained in the section above) effectively defeat various layers of memory protection by "short circuiting" them at a very low hardware level, practically creating a unique attack vector type that allows processes to alter the contents of arbitrary parts of the main memory by directly manipulating the underlying memory hardware.[2][4][18][34] In comparison, "conventional" attack vectors such as buffer overflows aim at circumventing the protection mechanisms at the software level, by exploiting various programming mistakes to achieve alterations of otherwise inaccessible main memory contents.[35] {{Anchor|JS}}Exploits
The initial research into the row hammer effect, published in June 2014, described the nature of disturbance errors and indicated the potential for constructing an attack, but did not provide any examples of a working security exploit.[1] A subsequent October 2014 research paper did not imply the existence of any security-related issues arising from the row hammer effect.[16] On March 9, 2015, Google's Project Zero revealed two working privilege escalation exploits based on the row hammer effect, establishing its exploitable nature on the x86-64 architecture. One of the revealed exploits targets the Google Native Client (NaCl) mechanism for running a limited subset of x86-64 machine instructions within a sandbox,[18]{{rp|27}} exploiting the row hammer effect to escape from the sandbox and gain the ability to issue system calls directly. This NaCl vulnerability, tracked as {{CVE|2015-0565}}, has been mitigated by modifying the NaCl so it does not allow execution of the The second exploit revealed by Project Zero runs as an unprivileged Linux process on the x86-64 architecture, exploiting the row hammer effect to gain unrestricted access to all physical memory installed in a computer. By combining the disturbance errors with memory spraying, this exploit is capable of altering page table entries (PTEs)[18]{{rp|35}} used by the virtual memory system for mapping virtual addresses to physical addresses, which results in the exploit gaining unrestricted memory access.[18]{{rp|34,36–57}} Due to its nature and the inability of the x86-64 architecture to make In July 2015, a group of security researchers published a paper that describes an architecture- and instruction-set-independent way for exploiting the row hammer effect. Instead of relying on the In October 2016, researchers at VUSec Systems and Network Security Group at VU Amsterdam published DRAMMER, an Android app which uses rowhammer with other methods to reliably gain root access to several popular models of smartphones. [42] The vulnerability was acknowledged as CVE-2016-6728[43] and a patch was released by Google within a month to mitigate its effect, however, due to the general nature of possible implementations of the attack, an effective software patch is difficult to reliably implement. In fact, as of June 2018, most proposals made by both academia and industry were either impractical to deploy, or insufficient in stopping all attacks.[44] To mitigate these attacks, researchers at VUSec Systems proposed a lightweight defense that prevents DMA-based attacks by isolating DMA buffers with guard rows.[44][45] Not all software states are vulnerable to rowhammer attacks. An attacker thus needs to find right target states in order to utilise rowhammer errors. In practice, one of the main challenges is in identifying target states. Such typically have been done by domain experts. The mainstream fault tolerance community responded to rowhammer attacks with a systematic methodology[46] which can be used to identify, validate, and evaluate rowhammer attack target states and their exploitability. That work is based on the well-established fault injection-based experimental methodology, and generalised attack target states and found a few practical target states that were previously unknown. See also{{Portal|Computer security|Electronics}}
Notes{{Notelist}}References1. ^1 2 3 4 5 6 7 8 {{cite web| url = http://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf| title = Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors| date = June 24, 2014 | accessdate = March 10, 2015| author1 = Yoongu Kim | author2 = Ross Daly | author3 = Jeremie Kim| author4 = Chris Fallin | author5 = Ji Hye Lee | author6 = Donghyuk Lee| author7 = Chris Wilkerson | author8 = Konrad Lai | author9 = Onur Mutlu| publisher = IEEE | website = ece.cmu.edu}} 2. ^1 2 3 4 5 {{cite web| url = https://arstechnica.com/security/2015/03/cutting-edge-hack-gives-super-user-status-by-exploiting-dram-weakness/| title = Cutting-edge hack gives super user status by exploiting DRAM weakness| date = March 10, 2015 | accessdate = March 10, 2015| author = Dan Goodin | publisher = Ars Technica}} 3. ^1 {{cite web| url = https://nakedsecurity.sophos.com/2015/03/12/row-hammering-how-to-exploit-a-computer-by-overworking-its-memory/| title = 'Row hammering' – how to exploit a computer by overworking its memory| date = March 12, 2015 | accessdate = March 14, 2015| author = Paul Ducklin | publisher = Sophos}} 4. ^1 2 3 4 5 6 {{cite web| url = http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html| title = Exploiting the DRAM rowhammer bug to gain kernel privileges| date = March 9, 2015 | accessdate = March 10, 2015| author1 = Mark Seaborn | author2 = Thomas Dullien| website = googleprojectzero.blogspot.com}} 5. ^{{cite news|url=https://arstechnica.com/security/2016/10/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing/|title=Using Rowhammer bitflips to root Android phones is now a thing|newspaper=Ars Technica|access-date=2016-10-25}} 6. ^{{Cite news|url=https://thehackernews.com/2018/05/rowhammer-android-hacking.html|title=GLitch: New 'Rowhammer' Attack Can Remotely Hijack Android Phones|last=Khandelwal|first=Swati|date=2018-05-03|work=The Hacker News|access-date=2018-05-21}} 7. ^{{Cite news|url=https://thehackernews.com/2018/05/rowhammer-attack-exploit.html|title=New Rowhammer Attack Can Hijack Computers Remotely Over the Network|last=Kumar|first=Mohit|date=2018-05-10|work=The Hacker News|access-date=2018-05-21}} 8. ^{{Cite news|url=https://thehackernews.com/2018/05/remote-rowhammer-attack.html|title=Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests|last=Khandelwal|first=Swati|date=2018-05-16|work=The Hacker News|access-date=2018-05-21}} 9. ^1 {{cite web| url = http://infobazy.gda.pl/2014/pliki/prezentacje/d2s2e4-Kaczmarski-Optymalna.pdf| title = Thoughts on Intel Xeon E5-2600 v2 Product Family Performance Optimisation – Component selection guidelines| date = August 2014 | accessdate = March 11, 2015| author = Marcin Kaczmarski | publisher = Intel| page = 13}} 10. ^1 {{cite web| url = http://www.memcon.com/pdfs/proceedings2014/NET105.pdf| title = Reliability, Availability, and Serviceability (RAS) for DDR DRAM interfaces| date = October 15, 2014 | accessdate = March 11, 2015| author = Marc Greenberg | website = memcon.com| pages = 2, 7, 10, 20, 27}} 11. ^1 2 {{cite web| url = http://www.eng.utah.edu/~cs7810/pres/11-7810-12.pdf| title = Lecture 12: DRAM Basics| date = February 17, 2011 | accessdate = March 10, 2015| website = utah.edu | pages = 2–7}} 12. ^1 {{cite web| url = https://www.ece.cmu.edu/~ece548/localcpy/dramop.pdf| title = Understanding DRAM Operation| date = December 1996 | accessdate = March 10, 2015| publisher = IBM}} 13. ^{{cite web| url = https://www.cs.princeton.edu/courses/archive/fall04/cos471/lectures/20-Memory.pdf| archiveurl = https://web.archive.org/web/20050519185856/http://www.cs.princeton.edu/courses/archive/fall04/cos471/lectures/20-Memory.pdf| title = Lecture 20: Memory Technology| date = November 23, 2004 | accessdate = March 10, 2015| archivedate = May 19, 2005| author = David August | website = cs.princeton.edu| pages = 3–5}} 14. ^{{cite web| url = http://www.cs.toronto.edu/~bianca/papers/sigmetrics09.pdf| title = DRAM Errors in the Wild: A Large-Scale Field Study| date = June 25, 2009 | accessdate = March 10, 2015| author1 = Bianca Schroeder | author2 = Eduardo Pinheiro | author3 = Wolf-Dietrich Weber| publisher = ACM| website = cs.toronto.edu }} 15. ^1 2 3 4 {{cite web| url = http://users.ece.cmu.edu/~omutlu/pub/dram-row-hammer_kim_talk_isca14.pdf| title = Flipping Bits in Memory Without Accessing Them: DRAM Disturbance Errors| date = June 24, 2014 | accessdate = March 10, 2015| author1 = Yoongu Kim | author2 = Ross Daly | author3 = Jeremie Kim| author4 = Chris Fallin | author5 = Ji Hye Lee | author6 = Donghyuk Lee| author7 = Chris Wilkerson | author8 = Konrad Lai | author9 = Onur Mutlu| website = ece.cmu.edu }} 16. ^1 {{cite book| chapter-url = http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7049516| title = Active-Precharge Hammering on a Row Induced Failure in DDR3 SDRAMs under 3x nm Technology| pages = 82–85| date = October 2014 | accessdate = March 16, 2015| author1 = Kyungbae Park | author2 = Sanghyeon Baeg| author3 = ShiJie Wen | author4 = Richard Wong| publisher = IEEE| doi = 10.1109/IIRW.2014.7049516| chapter = Active-precharge hammering on a row induced failure in DDR3 SDRAMs under 3× nm technology| isbn = 978-1-4799-7308-8}} 17. ^{{cite web| url = http://users.ece.cmu.edu/~omutlu/pub/rowhammer-summary.pdf| title = RowHammer: Reliability Analysis and Security Implications| date = July 30, 2015 | accessdate = August 7, 2015| author1 = Yoongu Kim | author2 = Ross Daly | author3 = Jeremie Kim| author4 = Chris Fallin | author5 = Ji Hye Lee | author6 = Donghyuk Lee| author7 = Chris Wilkerson | author8 = Konrad Lai | author9 = Onur Mutlu| website = ece.cmu.edu }} 18. ^1 2 3 4 5 6 {{cite web| url = https://www.blackhat.com/docs/us-15/materials/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges.pdf| title = Exploiting the DRAM rowhammer bug to gain kernel privileges: How to cause and exploit single bit errors| date = August 6, 2015 | accessdate = August 7, 2015| author1 = Mark Seaborn | author2 = Thomas Dullien| publisher = Black Hat }} 19. ^{{cite journal| url = https://www.wired.com/2015/03/google-hack-dram-memory-electric-leaks/| title = Googlers' Epic Hack Exploits How Memory Leaks Electricity| journal = Wired| date = March 10, 2015 | accessdate = March 17, 2015| author = Andy Greenberg }} 20. ^{{cite web | url = https://www.theregister.co.uk/2018/11/21/rowhammer_ecc_server_protection/ | title = 3 is the magic number (of bits): Flip 'em at once and your ECC protection can be Rowhammer'd | work = The Register | first = Shaun | last = Nichols | date = 2018-11-21 }} 21. ^{{cite web| url = https://support.lenovo.com/us/en/product_security/row_hammer| title = Row Hammer Privilege Escalation (Lenovo Security Advisory LEN-2015-009)| date = August 5, 2015 | accessdate = August 6, 2015| publisher = Lenovo}} 22. ^{{cite web |url = http://users.ece.gatech.edu/~pnair6/rowhammer/rowhammer.pdf |title = Architectural Support for Mitigating Row Hammering in DRAM Memories |date = October 9, 2014 |accessdate = March 11, 2015 |author1 = Dae-Hyun Kim |author2 = Prashant J. Nair |author3 = Moinuddin K. Qureshi |publisher = IEEE |website = ece.gatech.edu |deadurl = yes |archiveurl = https://web.archive.org/web/20150311061310/http://users.ece.gatech.edu/~pnair6/rowhammer/rowhammer.pdf |archivedate = March 11, 2015 |df = mdy-all}} 23. ^1 {{cite web| url = http://www.jedec.org/standards-documents/docs/jesd209-4a| title = JEDEC standard JESD209-4A: Low Power Double Data Rate (LPDDR4)| date = November 2015 | accessdate = January 10, 2016| publisher = JEDEC | format = PDF| pages = 222–223}} 24. ^{{cite web| url = http://www.memcon.com/pdfs/proceedings2014/MOB102.pdf#page=11| title = DRAM scaling challenges and solutions in LPDDR4 context| date = October 22, 2014 | accessdate = January 10, 2016| author = Kishore Kasamsetty | website = memcon.com| format = PDF | page = 11}} 25. ^{{cite web| url = http://blogs.cisco.com/security/mitigations-available-for-the-dram-row-hammer-vulnerability| title = Mitigations Available for the DRAM Row Hammer Vulnerability| date = March 9, 2015 | accessdate = March 11, 2015| author = Omar Santos | website = cisco.com}} 26. ^{{cite web| url = https://blogs.synopsys.com/committedtomemory/2015/03/09/row-hammering-what-it-is-and-how-hackers-could-use-it-to-gain-access-to-your-system/| title = Row Hammering: What it is, and how hackers could use it to gain access to your system| date = March 9, 2015 | accessdate = January 10, 2016| author = Marc Greenber | website = synopsys.com}} 27. ^{{cite web| url = http://aod.teletogether.com/sec/20140519/SAMSUNG_Investors_Forum_2014_session_1.pdf#page=15| title = Green Memory Solution (Samsung Investors Forum 2014)| date = November 7, 2014 | accessdate = January 10, 2016| author = Jung-Bae Lee | publisher = Samsung Electronics| website = teletogether.com | format = PDF | page = 15}} 28. ^{{cite web| url = https://www.jedec.org/standards-documents/docs/jesd79-4a| title = JEDEC standard JESD79-4A: DDR4 SDRAM| date = November 2013 | accessdate = January 10, 2016| publisher = JEDEC | format = PDF}} 29. ^{{cite web| url = http://www.micron.com/~/media/documents/products/data-sheet/dram/ddr4/4gb_ddr4_sdram.pdf| title = Data Sheet: 4 Gb ×4, ×8 and ×16 DDR4 SDRAM Features| date = November 20, 2015 | accessdate = January 10, 2016| publisher = Micron Technology | pages = 48, 131}} 30. ^{{cite web| url = https://www.blackhat.com/docs/us-15/materials/us-15-Herath-These-Are-Not-Your-Grand-Daddys-CPU-Performance-Counters-CPU-Hardware-Performance-Counters-For-Security.pdf| title = These are Not Your Grand Daddy's CPU Performance Counters: CPU Hardware Performance Counters for Security| date = August 6, 2015 | accessdate = January 9, 2016| author1 = Nishad Herath | author2 = Anders Fogh| publisher = Black Hat | pages = 29, 38–68}} 31. ^{{cite web| url = https://www.memtest86.com/support/ver_history.htm| title = PassMark MemTest86 – Version History| date = February 13, 2015 | accessdate = March 11, 2015| website = memtest86.com}} 32. ^{{cite web| url = http://www.csc.kth.se/utbildning/kth/kurser/DD2395/dasakh10/Slides/dasakh10Lecture09memory.pdf| title = Memory Protection| year = 2011 | accessdate = March 11, 2015| author = Pehr Söderman | website = csc.kth.se}} 33. ^{{cite web| url = http://niels.xtdnet.nl/papers/privsep.pdf| title = Preventing Privilege Escalation| date = August 10, 2003 | accessdate = March 11, 2015| author1 = Niels Provos | author2 = Markus Friedl | author3 = Peter Honeyman| website = niels.xtdnet.nl }} 34. ^1 2 {{cite web| url = http://www.zdnet.com/article/rowhammer-dram-flaw-could-be-widespread-says-google/| title = "Rowhammer" DRAM flaw could be widespread, says Google| date = March 10, 2015 | accessdate = March 11, 2015| author = Liam Tung | publisher = ZDNet}} 35. ^{{cite web| url = http://www.enderunix.org/docs/en/bof-eng.txt| title = Buffer Overflows Demystified| date = June 6, 2009 | accessdate = March 11, 2015| author = Murat Balaban | website = enderunix.org| format = TXT}} 36. ^{{cite web| url = http://x86.renejeschke.de/html/file_module_x86_id_30.html| title = CLFLUSH: Flush Cache Line (x86 Instruction Set Reference)| date = March 3, 2013 | accessdate = August 6, 2015| website = renejeschke.de}} 37. ^{{cite web| url = https://github.com/IAIK/rowhammerjs/blob/master/javascript/rowhammer.js| title = IAIK/rowhammerjs: rowhammerjs/rowhammer.js at master| date = July 27, 2015 | accessdate = July 29, 2015| author1 = Daniel Gruss | author2 = Clémentine Maurice| website = github.com}} 38. ^{{cite arXiv| eprint = 1507.06955| title = Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript| date = July 24, 2015| last1 = Gruss| first1 = Daniel| last2 = Maurice| first2 = Clémentine| last3 = Mangard| first3 = Stefan| class = cs.CR}} 39. ^{{cite web| url = http://www.slate.com/articles/technology/bitwise/2015/07/rowhammer_security_exploit_why_a_new_security_attack_is_truly_terrifying.html| title = Rowhammer security exploit: Why a new security attack is truly terrifying| date = July 28, 2015 | accessdate = July 29, 2015| author = David Auerbach | website = slate.com}} 40. ^{{cite news|publisher=Motherboard|title=Rowhammer.js Is the Most Ingenious Hack I've Ever Seen|first=Alix|last=Jean-Pharuns|date=2015-07-30|url=https://motherboard.vice.com/en_us/article/9akpwz/rowhammerjs-is-the-most-ingenious-hack-ive-ever-seen}} 41. ^{{cite news|publisher=Ars Technica|title=DRAM 'Bitflipping' exploit for attacking PCs: Just add JavaScript|first=Dan|last=Goodin|date=2015-08-04|url=https://arstechnica.com/information-technology/2015/08/dram-bitflipping-exploit-for-attacking-pcs-just-add-javascript/}} 42. ^{{cite web| url = https://www.vusec.net/projects/drammer/| title = DRAMMER: FLIP FENG SHUI GOES MOBILE| date = October 2016 | accessdate = January 21, 2017| author = VUSec}} 43. ^{{cite web| url = https://nvd.nist.gov/vuln/detail/CVE-2016-6728| title = CVE-2016-6728 Detail| author = NIST National Vulnerability Database (NVD)}} 44. ^1 {{Citation|last=van der Veen|first=Victor|title=GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM|date=2018|work=Detection of Intrusions and Malware, and Vulnerability Assessment|pages=92–113|publisher=Springer International Publishing|language=en|doi=10.1007/978-3-319-93411-2_5|isbn=9783319934105|last2=Lindorfer|first2=Martina|last3=Fratantonio|first3=Yanick|last4=Padmanabha Pillai|first4=Harikrishnan|last5=Vigna|first5=Giovanni|last6=Kruegel|first6=Christopher|last7=Bos|first7=Herbert|last8=Razavi|first8=Kaveh}} 45. ^{{Cite web|url=https://rampageattack.com/|title=RAMPAGE AND GUARDION - Vulnerabilities in modern phones enable unauthorized access|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=June 30, 2018}} 46. ^{{cite web| url = https://sites.google.com/site/keunsooyim/research| title = The rowhammer attack injection methodology| date = 2016| author = Keun Soo Yim}} External links
7 : Computer memory|Computer security exploits|Data quality|Privilege escalation exploits|Denial-of-service attacks|Hardware bugs|2014 in computer science |
||
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。