Yep, more data will corrupted than the actual data the attacker wants to modify. Unless they have specifically crafted the malware to work on a specific CPU and very specific memory. This means that different devices would be affected differently by the same malware. If they try to make it general-purpose, then there's less possibility of actually getting access to 1 specific system, but more likelyhood to get access to any device in a big set of devices. This is similar to what happens with hash cracking when the hashes aren't salted. You can crack 1 hash and get access to multiple accounts because 2 or more users have a common password, and because each of those users shares the same password between their own accounts
Why isnt the OS allocate its most important memory space, where user space cant write next to the cells? Like the first 10% of the RAM is OS seserved for example, and user space cant ever write to or near its cells? Then next to that, there could also be special resevered RAM space for user space apps, for little important informations, like passwords and keys, and the OS handles it so, that no user space program is allowed to write next to cells of other programs?
Can you add subtitles to your videos? There are certain words that I can't understand, and using RUclips's native CC doesn't help because it inserts the wrong words.
Thank you a lot for the quality of your explanations. I have one suggestion that could made your channel very popular is that you could focus more on the quality of the video and the audio, because it's not pleasing and disturb the audience. Thank you again.
I mean this isn't very bad right? I mean you could say you were to be next to the OS Permissions Table for the current process. We just happen to be able to hit all 16-bits of the process owner uid, and at least have the ability to clear these bits. I mean its not like clearing said bits can help you take over the computer. I mean, root can't take over the computer, right? kappa
8:40 It's Pickle Rick! lack of mois·ture moisCHər beans in water java and sparkling HEY wait a minuet There is a Blue Moon Coming the 31st Hummm : ok it they want blood, that's coming too
I find it really clever that rowhammer takes advantage of the actual physical properties of memory itself, rather than just the actual software.
This is exactly what I was looking for. Thanks for the great information, so well presented!
Other than the security risk, isn't there a serious danger of data corruption?
Yep, more data will corrupted than the actual data the attacker wants to modify. Unless they have specifically crafted the malware to work on a specific CPU and very specific memory. This means that different devices would be affected differently by the same malware. If they try to make it general-purpose, then there's less possibility of actually getting access to 1 specific system, but more likelyhood to get access to any device in a big set of devices.
This is similar to what happens with hash cracking when the hashes aren't salted. You can crack 1 hash and get access to multiple accounts because 2 or more users have a common password, and because each of those users shares the same password between their own accounts
Why isnt the OS allocate its most important memory space, where user space cant write next to the cells? Like the first 10% of the RAM is OS seserved for example, and user space cant ever write to or near its cells? Then next to that, there could also be special resevered RAM space for user space apps, for little important informations, like passwords and keys, and the OS handles it so, that no user space program is allowed to write next to cells of other programs?
you should be more popular your videos are very good and informative keep up the great work ☺
Can you add subtitles to your videos? There are certain words that I can't understand, and using RUclips's native CC doesn't help because it inserts the wrong words.
Thank you a lot for the quality of your explanations. I have one suggestion that could made your channel very popular is that you could focus more on the quality of the video and the audio, because it's not pleasing and disturb the audience. Thank you again.
I cant find the link at around 15:00
ruclips.net/video/x6hL-obNhAw/видео.html
wow. javascript that owns. I would have never thunk it.
8:08 So you have a parrot in your room?
Prof. Vigfusson, thank you for this informative video.
Interview tomorrow and this was very helpful! thankyou :D
Blue moon, here. Help...
Thanks Prof.. More videos please...
Nice explaination. Only one little thing. HDs are actually io devices.
really good video! only found it 4 years late thanks to youtube being youtube lol
Very well explained mate
I mean this isn't very bad right? I mean you could say you were to be next to the OS Permissions Table for the current process. We just happen to be able to hit all 16-bits of the process owner uid, and at least have the ability to clear these bits. I mean its not like clearing said bits can help you take over the computer.
I mean, root can't take over the computer, right? kappa
Great video, super annoying mouse pointer.
I can't find the link for the Jailbreaking in 15:01
github.com /vusec /drammer
Where is the link?
8:40 It's Pickle Rick! lack of mois·ture moisCHər beans in water java and sparkling HEY wait a minuet There is a Blue Moon Coming the 31st Hummm : ok it they want blood, that's coming too
awesome 😳
you are great you should be very famous