Menu
Google researchers hack computers using DRAM electrical leaks

Google researchers hack computers using DRAM electrical leaks

The 'Rowhammering' attack exploits electrical interference to change binary values in memory

Google researchers have written the first-ever attack code that takes advantage of electrical interference between densely packed memory cells, a unique style of attack that could require changes in chip design.

The work builds on a paper published last year by Carnegie Mellon University and Intel, which found it was possible to change binary values in stored memory by repeatedly accessing nearby memory cells, a process called "bit flipping."

DRAM memory is vulnerable to such electrical interference because the cells are so closely packed together, a result of engineers increasing a chip's memory capacity.

Chipmakers have known about electrical interference, but may have viewed it as a reliability issue rather than a security problem, wrote Mark Seaborn, a Google software engineer. Google's work shows bit flipping can have a much larger impact.

They tested 29 x86-based laptops manufactured between 2010 and last year and found some vulnerable. All of the laptops, which were not identified by make and model, used DDR3 DRAM.

A lack of technical information makes it hard to figure out more broadly which computers would be most vulnerable, Seaborn wrote.

"We don't know for sure how many machines are vulnerable to this attack, or how many existing vulnerable machines are fixable," he wrote.

Using a technique nicknamed rowhammering, Google's two exploits repeatedly accessed a row of memory cells, causing binary values in nearby ones to change from a 0 to 1 or the reverse.

Rowhammering allowed the first exploit to complete a privilege escalation attack and escape a sandbox Google has in Chrome that is supposed to limit what an application running in the browser can do. Once out of the sandbox, the code could directly access the operating system, Seaborn wrote.

The second exploit uses rowhammer-induced bit flips to gain kernel-level privileges. The bit flips were introduced in page-table entries, which map virtual memory to physical memory. The code then had read-write access to all of the computer's physical memory, Seaborn wrote.

There are some mitigations for bit flipping in the latest DDR4 DRAM chips, which have succeeded DDR3 in many laptops and servers. But those mitigations may have been put in place just for reliability reasons, he wrote.

"History has shown that issues that are thought to be 'only' reliability issues often have significant security implications, and the rowhammer problem is a good example of this," he wrote. "Many layers of software security rest on the assumption the contents of memory locations don't change unless the locations are written to."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags Google

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments