YoVDO

Exploiting Correcting Codes on the Effectiveness of ECC Memory Against Rowhammer Attacks

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Reverse Engineering Courses Hardware Security Courses

Course Description

Overview

Explore the vulnerabilities of Error-Correcting Code (ECC) memory against Rowhammer attacks in this 20-minute conference talk presented at the 2019 IEEE Symposium on Security & Privacy. Delve into the challenges of assessing ECC's effectiveness as a defense mechanism, including the lack of detailed information on commodity system implementations and the limitations of existing exploitation techniques. Discover a novel approach that combines custom hardware probes, Rowhammer bit flips, and cold boot attacks to reverse engineer ECC functions on AMD and Intel processors. Learn about ECCploit, a new Rowhammer attack method that utilizes composable, data-controlled bit flips and exploits a previously unknown side channel in the ECC memory controller. Examine how ECCploit demonstrates that ECC memory, while reducing the attack surface, remains susceptible to reliable Rowhammer attacks across various systems and configurations. Gain insights into the practical power of ECCploit in mimicking prior Rowhammer exploits despite the constraints imposed by ECC memory.

Syllabus

Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam