[Info-vax] Throwhammer, remote Rowhammer via RDMA (was Re: CVE-2018-8897 Privilege Escalation due to widespread misunderstanding of x86-64 privileged instruction semantics)

Simon Clubley clubley at remove_me.eisner.decus.org-Earth.UFP
Fri May 11 08:30:03 EDT 2018


On 2018-05-10, Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
>
> More security fun, a remote rowhammer via RDMA.
>
> "Throwhammer: Rowhammer Attacks over the Network and Defenses"
>
> https://arstechnica.com/information-technology/2018/05/attackers-trigger-rowhammer-bit-flips-by-sending-network-packets-over-a-lan/ 
>
>
> Which means memory-level rowhammer detection, or faster or smarter 
> (TRR/pTRR) refresh support.  ECC alone isn't quite enough.
>
> DDR-related hardware updates for Itanium and Alpha systems are just not 
> going to happen.
>

At the rate things are developing, we are all going to be going back
to using 32/64/128MB EDO/FPM memory based systems if we want a reasonably
secure hardware platform.

Of course, that means you won't be able to autogenerate GB of code
to add a few numbers together and will have to actually know how
all the layers in a computer work. :-)

I say the above in jest, but I wouldn't mind betting that some
people are seriously wondering if returning to much older technology
is one way to get a more secure hardware platform.

Simon.

-- 
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Microsoft: Bringing you 1980s technology to a 21st century world



More information about the Info-vax mailing list