【24h】

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript

机译:Rowhammer.js:JavaScript中的远程软件引发的故障攻击

获取原文

摘要

A fundamental assumption in software security is that a memory location can only be modified by processes that may write to this memory location. However, a recent study has shown that parasitic effects in DRAM can change the content of a memory cell without accessing it, but by accessing other memory locations in a high frequency. This so-called Rowhammer bug occurs in most of today's memory modules and has fatal consequences for the security of all affected systems, e.g., privilege escalation attacks. All studies and attacks related to Rowhammer so far rely on the availability of a cache flush instruction in order to cause accesses to DRAM modules at a sufficiently high frequency. We overcome this limitation by defeating complex cache replacement policies. We show that caches can be forced into fast cache eviction to trigger the Rowhammer bug with only regular memory accesses. This allows to trigger the Rowhammer bug in highly restricted and even scripting environments. We demonstrate a fully automated attack that requires nothing but a website with JavaScript to trigger faults on remote hardware. Thereby we can gain unrestricted access to systems of website visitors. We show that the attack works on off-the-shelf systems. Existing countermeasures fail to protect against this new Rowhammer attack.
机译:软件安全性的基本假设是,只能通过可能写入该内存位置的进程来修改该内存位置。但是,最近的一项研究表明,DRAM中的寄生效应可以改变存储单元的内容,而无需访问它,而是通过高频率访问其他存储位置。这种所谓的Rowhammer错误出现在当今的大多数内存模块中,并对所有受影响系统的安全(例如特权升级攻击)产生致命影响。迄今为止,与Rowhammer有关的所有研究和攻击都依赖于高速缓存刷新指令的可用性,以便引起以足够高的频率访问DRAM模块。我们通过克服复杂的缓存替换策略来克服此限制。我们显示,可以仅通过常规内存访问就可以将高速缓存强行驱逐到快速高速缓存逐出以触发Rowhammer错误。这允许在严格限制甚至脚本编写的环境中触发Rowhammer错误。我们演示了一种全自动攻击,该攻击只需要一个带有JavaScript的网站即可触发远程硬件上的故障。因此,我们可以不受限制地访问网站访问者系统。我们证明了这种攻击可以在现成的系统上运行。现有的对策无法防范这种新的Rowhammer攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号