Re:RAMBleed: Reading Bits in Memory Without Accessing Them
von makai am 13.06.19 um 16:39
Antwort auf: Re:RAMBleed: Reading Bits in Memory Without Accessing Them von Border

>>https://rambleed.com/
>>
>>As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. However, RAMBleed can be used for reading other data as well.
>>
>>Ja geil...
>
>Dann aber fix mal schnell alles auf DDR4 hochziehen. Hab's eben mal dem Admin gezeigt. Weisere Worte wurden selten gesprochen: „Oh, Scheiße!“ ;)

DDR4 supports a defensive technique called Targeted Row Refresh, but its efficacy is uncertain
https://www.theregister.co.uk/2019/06/11/rambleed_rowhammer_attack/
Mal schauen was da noch kommt.

< antworten >