Projects per year
Abstract
In this paper, we present Nethammer, a remote Rowhammer attack without a single attacker-controlled line of code on the targeted system, i.e., not even JavaScript. Nethammer works on commodity consumer-grade systems that either are protected with quality-of-service techniques like Intel CAT or that use uncached memory, flush instructions, or non-temporal instructions while handling network requests (e.g., for interaction with the network device). We demonstrate that the frequency of the cache misses is in all three cases high enough to induce bit flips. Our evaluation showed that depending on the location, the bit flip compromises either the security and integrity of the system and the data of its users, or it can leave persistent damage on the system, i.e., persistent denial of service. We invalidate threat models of Rowhammer defenses building upon the assumption of a local attacker. Consequently, we show that most state-of-the-art defenses have no effect on our attack. In particular, we demonstrate that target-row-refresh (TRR) implemented in DDR4 has no aggravating effect on local or remote Rowhammer attacks.
Original language | English |
---|---|
Title of host publication | 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) |
Publisher | IEEE |
Pages | 710-719 |
Number of pages | 10 |
ISBN (Electronic) | 9781728185972 |
DOIs | |
Publication status | Published - Sept 2020 |
Event | 5th IEEE European Symposium on Security and Privacy: SILM Workshop - Virtual, Italy Duration: 7 Sept 2020 → 11 Sept 2020 |
Conference
Conference | 5th IEEE European Symposium on Security and Privacy |
---|---|
Abbreviated title | EuroS&P 2020 |
Country/Territory | Italy |
City | Virtual |
Period | 7/09/20 → 11/09/20 |
Keywords
- Fault Attack
- Rowhammer
- TRR
ASJC Scopus subject areas
- Computer Networks and Communications
- Information Systems and Management
- Safety, Risk, Reliability and Quality
Fingerprint
Dive into the research topics of 'Nethammer: Inducing Rowhammer Faults through Network Requests: Inducing Rowhammer Faults through Network Requests'. Together they form a unique fingerprint.Projects
- 2 Finished
-
Dessnet - Dependable, secure and time-aware sensor networks
Mangard, S. (Co-Investigator (CoI)), Glanzer, C. (Co-Investigator (CoI)), Görtschacher, L. J. (Co-Investigator (CoI)), Bösch, W. (Co-Investigator (CoI)), Grosinger, J. (Co-Investigator (CoI)), Fischbacher, R. B. (Co-Investigator (CoI)), Deutschmann, B. (Co-Investigator (CoI)) & Shetty, D. (Co-Investigator (CoI))
1/06/17 → 31/05/21
Project: Research project
-
EU - SOPHIA - Securing Software against Physical Attacks
Mangard, S. (Co-Investigator (CoI))
1/09/16 → 31/12/21
Project: Research project