首页> 外文会议>IEEE European Symposium on Security and Privacy Workshops >Nethammer: Inducing Rowhammer Faults through Network Requests
【24h】

Nethammer: Inducing Rowhammer Faults through Network Requests

机译:Nethammer:通过网络请求引发Rowhammer故障

获取原文

摘要

In this paper, we present Nethammer, a remote Rowhammer attack without a single attacker-controlled line of code on the targeted system, i.e., not even JavaScript. Nethammer works on commodity consumer-grade systems that either are protected with quality-of-service techniques like Intel CAT or that use uncached memory, flush instructions, or non-temporal instructions while handling network requests (e.g., for interaction with the network device). We demonstrate that the frequency of the cache misses is in all three cases high enough to induce bit flips. Our evaluation showed that depending on the location, the bit flip compromises either the security and integrity of the system and the data of its users, or it can leave persistent damage on the system, i.e., persistent denial of service. We invalidate threat models of Rowhammer defenses building upon the assumption of a local attacker. Consequently, we show that most state-of-the-art defenses do not affect our attack. In particular, we demonstrate that target-row-refresh (TRR) implemented in DDR4 has no aggravating effect on local or remote Rowhammer attacks.
机译:在本文中,我们介绍了Nethammer,这是一种远程Rowhammer攻击,目标系统上没有由攻击者控制的单一代码行,甚至没有JavaScript。 Nethammer可在商品消费级系统上工作,这些系统要么受到服务质量技术(如Intel CAT)的保护,要么在处理网络请求(例如,与网络设备进行交互)时使用未缓存的内存,刷新指令或非临时性指令。我们证明,在所有三种情况下,高速缓存未命中的频率都足以引起位翻转。我们的评估表明,根据位置的不同,比特翻转会损害系统及其用户数据的安全性和完整性,或者会给系统造成持续的损害,即持续的拒绝服务。我们基于本地攻击者的假设使Rowhammer防御的威胁模型失效。因此,我们表明大多数最新的防御措施都不会影响我们的攻击。特别是,我们证明了在DDR4中实现的目标行刷新(TRR)对本地或远程Rowhammer攻击没有加剧的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号