...
首页> 外文期刊>Microprocessor report >UPMEM NAILS ROWHAMMER: French Company Offers Defense Against DRAM Vulnerability
【24h】

UPMEM NAILS ROWHAMMER: French Company Offers Defense Against DRAM Vulnerability

机译:Upmem Nails Rowhammer:法国公司为DRAM漏洞提供防御

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Although human memory is notoriously faulty, computer memory requires perfection. We hardly notice a few wayward synapses, but a single-bit error in DRAM can crash a program or even a whole computer. Error-correction codes (ECC) protect servers and other mission-critical systems from random "soft errors" that flip a DRAM bit cell from one to zero or vice versa, but larger errors remain a problem. In recent years, a deliberate attack called Row-Hammer is playing havoc with DRAM chips and the computers that rely on them.First documented in 2014, RowHammer deliberately flips bits by rapidly and repeatedly accessing specific DRAM rows. Although it's unable to control the flips to write malicious code into memory, it can overwhelm ECC protection, crashing the affected program or forcing the entire system to reboot. In its simplest form, RowHammer mounts a denial-of-service (DoS) attack. In more-sophisticated assaults, it can trigger a fault that gives the attacker elevated system privileges or access to another user's virtual partition on a shared server. In other words, it's potentially catastrophic.
机译:虽然人类记忆臭名昭着,但计算机内存需要完美。我们几乎没有注意到一些任务突触,但DRAM中的单位错误可能会崩溃程序甚至整个计算机。纠错码(ECC)保护服务器和其他任务关键系统从随机“软错误”,将DRAM位单元从一个到零翻转,反之亦然,但较大的错误仍然是一个问题。近年来,刻意的攻击被称为行锤的攻击攻击是用DRAM筹码和依赖于它们的计算机的破坏。首先在2014年记录,Rowhammer通过快速且重复访问特定的DRAM行,故意翻转位。虽然它无法控制将恶意代码写入内存的翻转,但它可以压倒ECC保护,崩溃受影响的程序或强制整个系统重新启动。在最简单的形式中,Rowhammer安装了拒绝服务(DOS)攻击。在更复杂的攻击中,它可以触发一个故障,使攻击者提升系统权限或访问共享服务器上的其他用户的虚拟分区。换句话说,它可能是灾难性的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号