Another Flip in the Row

Another Flip in the Row

Black Hat via YouTube Direct link

Access techniques

6 of 33

6 of 33

Access techniques

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Another Flip in the Row

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 How reading from DRAM works
  3. 3 Timing difference
  4. 4 How widespread is the issue?
  5. 5 Requirements
  6. 6 Access techniques
  7. 7 Physical addresses and DRAM
  8. 8 How to exploit random bit flips?
  9. 9 Strategy: Modify instructions
  10. 10 Page Table Entries
  11. 11 Page Table Manipulation
  12. 12 Post-Rowhammer Exploitation
  13. 13 Bit Flips + Page Deduplication
  14. 14 Mitigations
  15. 15 What about ECC?
  16. 16 Preventing Rowhammer attacks in hardware (1/3)
  17. 17 Preventing Rowhammer attacks in software
  18. 18 Detecting Rowhammer attacks
  19. 19 Defenses Overview
  20. 20 How to hammer?
  21. 21 Single-sided hammering
  22. 22 Double-sided hammering
  23. 23 Hammering techniques
  24. 24 One-location hammering
  25. 25 Memory-Controller Policies
  26. 26 How well does it work?
  27. 27 Opcode Flipping - Conditional Jump
  28. 28 Page Cache
  29. 29 Memory Waylaying
  30. 30 SGX Encrypted Memory
  31. 31 (Ab)using SGX Protection
  32. 32 Just comparing some performance numbers...
  33. 33 Exploiting Nethammer Bit Flips

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.