TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Researchers have significantly increased the scope of the Rowhammer threat

157 pointsby rayascottover 6 years ago

9 comments

userbinatorover 6 years ago
Attack or otherwise, this is ultimately a hardware reliability problem. Any access pattern that can cause bit errors is indicative of faulty memory. If I remember correctly, the original Rowhammer paper shows that RAM from ~2009 and before was completely unaffected. Yet in the continuing quest for higher densities and lower costs (is RAM not cheap enough already?) the manufacturers are sacrificing reliability and correctness, and IMHO that is not acceptable, nor is their insistence that this is not a problem (it seems they were powerful enough to convince one well-known memory testing application to make the RH test optional(!) and spread FUD that it wasn't really a concern if that test failed, because a lot of RAM would fail it.) NO access pattern should ever cause errors to occur on correctly functioning hardware.
评论 #18585418 未加载
评论 #18585969 未加载
评论 #18585634 未加载
评论 #18585987 未加载
评论 #18586121 未加载
kensover 6 years ago
Surprisingly, Rowhammer-like memory problems go back to the early 1950s. Early computers (such as Manchester Baby and the IBM 701) used electrostatic Williams tubes as their main memory, storing data as dots and dashes on CRT tubes. One problem with Williams tubes was that if you accessed a location on the screen multiple times, the charge on a neighboring spot could be affected, flipping the bit. (Of course back then this was a correctness issue, not a security issue.) The quality of the tube was measured by the read-around ratio, the number of times you could read a bit without corrupting the neighbors. A good tube might have a read-around ratio of 50. Nobody missed Williams tubes when they were replaced by core memory.
评论 #18586179 未加载
femtoover 6 years ago
Couldn&#x27;t the error rate of the ECC system be monitored, to detect an attack in progress and raise an alarm?<p>Even if the attacker was able to get the flipping completely reliable, there would presumably be a learning&#x2F;probing phase with a period of elevated ECC. Either this probe could be detected, or the attacker would be forced to remain below a threshold of detectability slowing the attack down enough to make it impractical?
评论 #18585649 未加载
评论 #18588259 未加载
carbocationover 6 years ago
In brief, the authors show that ECC is also affected, not just non-ECC RAM.
评论 #18586730 未加载
评论 #18585668 未加载
kibwenover 6 years ago
I wonder if having a separate stick of RAM exclusively dedicated to kernelspace would provide any mitigation against privelige escalation via rowhammer. Are we considering a future where every &quot;ring&quot; is literally a separate set of CPU, RAM, etc in order to stymie side channels, or is that just too crazy?
评论 #18585845 未加载
评论 #18588016 未加载
评论 #18585866 未加载
评论 #18587390 未加载
mettamageover 6 years ago
Haven&#x27;t read the full article, but if I remember correctly in order for ECCploit to work you do need to reverse the ECC function of a memory controller first.<p>Also for people who just want the link of the academic article (including abstract):<p><a href="https:&#x2F;&#x2F;cs.vu.nl&#x2F;~lcr220&#x2F;ecc&#x2F;ecc-rh-paper-eccploit-press-preprint.pdf" rel="nofollow">https:&#x2F;&#x2F;cs.vu.nl&#x2F;~lcr220&#x2F;ecc&#x2F;ecc-rh-paper-eccploit-press-pre...</a>
mirimirover 6 years ago
This is certainly a serious threat.<p>However, it&#x27;s my understanding that exploits depend on running code (including JavaScript) on the target system (or in a sandbox or VM). Is that true?
评论 #18586206 未加载
justajover 6 years ago
If I&#x27;m not mistaken this attack is negated by DDR4 RAM, is that correct?
评论 #18588005 未加载
ccnafrover 6 years ago
Leave it to Wired to blow a theoretical attack out of proportion
评论 #18585081 未加载
评论 #18585629 未加载