Row Hammer: Flipping Bits in Memory Without Accessing Them - Papers We Love

แชร์
ฝัง
  • เผยแพร่เมื่อ 10 พ.ย. 2024

ความคิดเห็น • 9

  • @dudzcom
    @dudzcom 6 ปีที่แล้ว

    Great talk! Thanks!

  • @SebastiaanDeckers
    @SebastiaanDeckers 7 ปีที่แล้ว +1

    Great talk, amazing animations and diagrams.

    • @burnflare
      @burnflare 7 ปีที่แล้ว

      Sebastiaan Deckers Thanks!

    • @shepardhudson4528
      @shepardhudson4528 3 ปีที่แล้ว

      You probably dont care at all but does anyone know of a method to get back into an instagram account??
      I was dumb forgot my account password. I would love any tips you can give me

    • @mylesmarlon1526
      @mylesmarlon1526 3 ปีที่แล้ว

      @Shepard Hudson Instablaster ;)

  • @timfalardeau9753
    @timfalardeau9753 6 ปีที่แล้ว

    I predict sysadmins around the world will be watching this video in the coming weeks...
    There is a PANIC among my kind...

  • @ihstein
    @ihstein 5 ปีที่แล้ว

    I have a question: In the exploit part, you suppose that the rowhammer occurs within a PTE, which is a priori a kernel land address and by consequence not accessible to read (and hammer) ?

    • @michaeldamolsen
      @michaeldamolsen 4 ปีที่แล้ว +3

      The assumption is that you will be able to access a row near the PTE, or ideally rows on both sides of it. If you cause a very large number of PTEs to be allocated, this will increase your chances of flipping a bit on one of them. This technique of creating a large number of exploitable structures in the hope that one of them will be compromised is called spraying.
      I know you asked a long time ago, and probably found this on your own, but I thought I'd leave an answer for others that read the comments :)

    • @ihstein
      @ihstein 4 ปีที่แล้ว

      @@michaeldamolsen Yes, thanks anyway ! Your answer may be useful for other folks