Conversation
Notices
-
clacke (clacke@social.heldscal.la)'s status on Friday, 11-May-2018 16:29:41 EDT clacke
With a 10 Gbps network and a DMA network card on the target machine, you can make a Rowhammer attack without running your code on the target machine; Your network packets will be enough:
> Imagine an attacker has either rented or compromised a system inside the network. Assuming RDMA support and an RDMA application on the server, Throwhammer can potentially exploit the application by triggering bit flips. This changes the threat model from requiring the attacker to have code execution on the victim (through JavaScript or natively) to merely being able to send network packets to an open port.
https://social.heldscal.la/url/1519304
The researchers dubbed the attack "Throwhammer".