【24h】

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript

机译:Rowhammer.js:JavaScript中的远程软件引起的故障攻击

获取原文

摘要

A fundamental assumption in software security is that a memory location can only be modified by processes that may write to this memory location. However, a recent study has shown that parasitic effects in DRAM can change the content of a memory cell without accessing it, but by accessing other memory locations in a high frequency. This so-called Rowhammer bug occurs in most of today's memory modules and has fatal consequences for the security of all affected systems, e.g., privilege escalation attacks. All studies and attacks related to Rowhammer so far rely on the availability of a cache flush instruction in order to cause accesses to DRAM modules at a sufficiently high frequency. We overcome this limitation by defeating complex cache replacement policies. We show that caches can be forced into fast cache eviction to trigger the Rowhammer bug with only regular memory accesses. This allows to trigger the Rowhammer bug in highly restricted and even scripting environments. We demonstrate a fully automated attack that requires nothing but a website with JavaScript to trigger faults on remote hardware. Thereby we can gain unrestricted access to systems of website visitors. We show that the attack works on off-the-shelf systems. Existing countermeasures fail to protect against this new Rowhammer attack.
机译:软件安全性的基本假设是存储位置只能通过可以写入该存储器位置的进程进行修改。然而,最近的一项研究表明,DRAM中的寄生效应可以在不访问它的情况下改变存储器单元的内容,而是通过以高频访问其他存储器位置。这所谓的Rowhammer错误发生在今天的大多数内存模块中,并且对所有受影响系统的安全性具有致命后果,例如,特权升级攻击。到目前为止,所有与Rowhammer相关的研究和攻击都依赖于缓存冲洗指令的可用性,以便以足够高的频率对DRAM模块进行访问。我们通过击败复杂的缓存替换政策来克服这种限制。我们显示缓存可以强制进入快速缓存驱逐,以触发只有常规内存访问的Rowhammer错误。这允许在高度限制甚至脚本环境中触发Rowhammer错误。我们展示了一个完全自动化的攻击,除了一个网站上的网站,只需要一个javascript来触发远程硬件上的故障。因此,我们可以获得对网站访问者的系统的不受限制的访问权限。我们表明攻击在现成的系统上工作。现有对策未能防止这种新的Rowhammer攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号