How Your DRAM Becomes a Security Problem

How Your DRAM Becomes a Security Problem

Black Hat via YouTube Direct link

DDR4 Row hammer

30 of 31

30 of 31

DDR4 Row hammer

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

How Your DRAM Becomes a Security Problem

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 About this presentation
  3. 3 Take aways
  4. 4 From code to capacitor
  5. 5 Why translation
  6. 6 Address translation on x86-64
  7. 7 Virtual and physical addressing
  8. 8 Road block: Data Caches
  9. 9 Bypass cache road block
  10. 10 How does physical addresses map to memory
  11. 11 DRAM organization
  12. 12 First hint of trouble
  13. 13 The Row buffer
  14. 14 How reading from DRAM works
  15. 15 We can measure a difference
  16. 16 Summary
  17. 17 Remember this?
  18. 18 Reversing the mapping function - Approach
  19. 19 Imagine this code
  20. 20 Spying
  21. 21 Two related questions
  22. 22 How our demo really works
  23. 23 Attacks
  24. 24 Scenario
  25. 25 The solution
  26. 26 The gory details - bits
  27. 27 The gory details - Packets
  28. 28 Rowhammer
  29. 29 Finding rows
  30. 30 DDR4 Row hammer
  31. 31 Black Hat Sound Bytes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.