Rowhammer attacks explained simply

Поделиться
HTML-код
  • Опубликовано: 22 авг 2024

Комментарии • 26

  • @Guru_1092
    @Guru_1092 4 года назад +15

    I find it really clever that rowhammer takes advantage of the actual physical properties of memory itself, rather than just the actual software.

  • @debren27
    @debren27 4 года назад +11

    This is exactly what I was looking for. Thanks for the great information, so well presented!

  • @dario2813
    @dario2813 7 лет назад +17

    you should be more popular your videos are very good and informative keep up the great work ☺

  • @martinkunev9911
    @martinkunev9911 3 года назад +5

    Other than the security risk, isn't there a serious danger of data corruption?

    • @Rudxain
      @Rudxain 2 года назад +1

      Yep, more data will corrupted than the actual data the attacker wants to modify. Unless they have specifically crafted the malware to work on a specific CPU and very specific memory. This means that different devices would be affected differently by the same malware. If they try to make it general-purpose, then there's less possibility of actually getting access to 1 specific system, but more likelyhood to get access to any device in a big set of devices.
      This is similar to what happens with hash cracking when the hashes aren't salted. You can crack 1 hash and get access to multiple accounts because 2 or more users have a common password, and because each of those users shares the same password between their own accounts

  • @sohaibattaiki9579
    @sohaibattaiki9579 6 лет назад +4

    Thank you a lot for the quality of your explanations. I have one suggestion that could made your channel very popular is that you could focus more on the quality of the video and the audio, because it's not pleasing and disturb the audience. Thank you again.

  • @Lancechingchong
    @Lancechingchong 5 лет назад +1

    Interview tomorrow and this was very helpful! thankyou :D

  • @anteconfig5391
    @anteconfig5391 5 лет назад +3

    wow. javascript that owns. I would have never thunk it.

  • @bestonyoutube
    @bestonyoutube 5 лет назад +4

    Why isnt the OS allocate its most important memory space, where user space cant write next to the cells? Like the first 10% of the RAM is OS seserved for example, and user space cant ever write to or near its cells? Then next to that, there could also be special resevered RAM space for user space apps, for little important informations, like passwords and keys, and the OS handles it so, that no user space program is allowed to write next to cells of other programs?

  • @danielmeyer885
    @danielmeyer885 6 лет назад

    Prof. Vigfusson, thank you for this informative video.

  • @whamer100
    @whamer100 3 года назад

    really good video! only found it 4 years late thanks to youtube being youtube lol

  • @HansTheGeek
    @HansTheGeek 6 лет назад

    Nice explaination. Only one little thing. HDs are actually io devices.

  • @spacefentionz
    @spacefentionz 6 лет назад +3

    Can you add subtitles to your videos? There are certain words that I can't understand, and using RUclips's native CC doesn't help because it inserts the wrong words.

  • @whiskeysquiker
    @whiskeysquiker 5 лет назад +1

    Blue moon, here. Help...

  • @Tommiegrand
    @Tommiegrand 5 лет назад +2

    Great video, super annoying mouse pointer.

  • @linuxinside6188
    @linuxinside6188 5 лет назад

    Thanks Prof.. More videos please...

  • @OpenGL4ever
    @OpenGL4ever 4 месяца назад

    8:08 So you have a parrot in your room?

  • @CarlHeaton
    @CarlHeaton 5 лет назад

    Very well explained mate

  • @dustinjohnson6302
    @dustinjohnson6302 6 лет назад +4

    I cant find the link at around 15:00

    • @FeribHellscream
      @FeribHellscream 6 лет назад +4

      ruclips.net/video/x6hL-obNhAw/видео.html

  • @sheerazali2395
    @sheerazali2395 6 лет назад

    you are great you should be very famous

  • @connorhorman
    @connorhorman 5 лет назад

    I mean this isn't very bad right? I mean you could say you were to be next to the OS Permissions Table for the current process. We just happen to be able to hit all 16-bits of the process owner uid, and at least have the ability to clear these bits. I mean its not like clearing said bits can help you take over the computer.
    I mean, root can't take over the computer, right? kappa

  • @shaybloodmoon141
    @shaybloodmoon141 6 лет назад

    8:40 It's Pickle Rick! lack of mois·ture moisCHər beans in water java and sparkling HEY wait a minuet There is a Blue Moon Coming the 31st Hummm : ok it they want blood, that's coming too

  • @adibkhan975
    @adibkhan975 7 лет назад +1

    Where is the link?

  • @KamenosTheGreek
    @KamenosTheGreek 7 лет назад

    I can't find the link for the Jailbreaking in 15:01

    • @biehdc
      @biehdc 7 лет назад

      github.com /vusec /drammer