Breaking News

KINGMAX Launches DDR5 Horizon II Overclocking Memory Module, Tailored for High-Load Scenarios DeepCool Unveils SPARTACUS 360 AIO Liquid Cooler for High-End Performance and Customization KINGMAX Launches New DDR4 Blade X Gaming RAM, Delivering Powerful Performance for Intel/AMD Platforms Corsair announces FRAME 4000D LCD RS ARGB PC Case Samsung Launches One UI 8.5 Beta for Next-Level Ease of Use

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Researchers Showcase Javascript-based Attack On a Computer's DRAM

Researchers Showcase Javascript-based Attack On a Computer's DRAM

Enterprise & IT Jul 30,2015 0

Researchers have proved that a web-based attack can exploit a roblem affecting densely packed memory chip cells. As DRAM has been scaling to increase in density, the cells are less isolated from each other. Recent studies have found that repeated accesses to DRAM rows can cause random bit flips in an adjacent row, resulting in the so called "Rowhammer"bug. This bug has already been exploited to gain root privileges and to evade a sandbox, showing the severity of faulting single bits for security. However, these exploits are written in native code and use special instructions to flush data from the cache.

In a paper co-authored by Daniel Gruss and Stefan Mangard of Graz University of Technology in Austria, and Clementine Maurice of Technicolor and Eurecom in France, the researchers presented Rowhammer.js, a JavaScript-based implementation of the Rowhammer attack. The attack uses an eviction strategy found by a generic algorithm that improves the eviction rate compared to existing eviction strategies from 95.2% to 99.99%.

Rowhammer.js is the first remote software-induced hardware-fault attack. In contrast to other fault attacks it does not require physical access to the machine, or the execution of native code or access to special instructions. As JavaScript-based fault attacks can be performed on millions of users stealthily and simultaneously, the researchers propose countermeasures that can be implemented immediately.

Rowhammer.js, was tested in Firefox 39, "but our attack technique is generic and can be applied to any architecture, programming language and runtime environment," they wrote.

It also doesn't require physical access to a computer, which makes it a lot more dangerous. That also means that large numbers of people could be targeted over the Web, increasing its potential victim pool.

"Since the attack can be performed on an arbitrary number of victim machines simultaneously and stealthily, it poses an enormous security threat," the researchers wrote.

In addition, many different types of computers are vulnerable, regardless of operating system, as the rowhammer bug affects many kinds of microchip architectures. The researchers are still figuring how exactly how many systems would be vulnerable to their attack.

So far, the researchers have not developed an exploit that would give root access to a computer using rowhammering, but they expect attackers eventually to expand on the capabilities of the exploit they discovered.

Until a longer term solution to Rowhammer.js is found, the researchers proposed that Web browsers should be updated to include a test to figure out if a computer is vulnerable.

Another option for users is to completely disable JavaScript using a browser extension such as NoScript.

Tags: Hacking
Previous Post
Sharp to Exit Americas TV Market
Next Post
Hackers Used Twitter hashtags To Extract Data From Compromised Networks

Related Posts

  • MSI has been hacked, be warned about where you download files

  • Hackers gain access to PS5 Debug Menu and show decrypted PS5 firmware files

  • HP Threat Research Shows Attackers Exploiting Zero‐Day Vulnerability Before Enterprises Can Patch

  • EA Gets hacked - 780GB of data and sourcecode stolen

  • European Supercomputers Researching Covid-19 Report Hacking Attacks

  • Microsoft Offers You $100,000 If You Can Hack the Linux-based Azure Sphere

  • Zoom Users' Data have Been on Sale on Dark Web: report

  • Indonesia's Tokopedia Inverstigates Alleged Data Leak of 91 Million Users

Latest News

KINGMAX Launches DDR5 Horizon II Overclocking Memory Module, Tailored for High-Load Scenarios
PC components

KINGMAX Launches DDR5 Horizon II Overclocking Memory Module, Tailored for High-Load Scenarios

DeepCool Unveils SPARTACUS 360 AIO Liquid Cooler for High-End Performance and Customization
Cooling Systems

DeepCool Unveils SPARTACUS 360 AIO Liquid Cooler for High-End Performance and Customization

KINGMAX Launches New DDR4 Blade X Gaming RAM, Delivering Powerful Performance for Intel/AMD Platforms
PC components

KINGMAX Launches New DDR4 Blade X Gaming RAM, Delivering Powerful Performance for Intel/AMD Platforms

Corsair announces FRAME 4000D LCD RS ARGB PC Case
Cooling Systems

Corsair announces FRAME 4000D LCD RS ARGB PC Case

Samsung Launches One UI 8.5 Beta for Next-Level Ease of Use
Smartphones

Samsung Launches One UI 8.5 Beta for Next-Level Ease of Use

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed