Drammer - The Making Of

Drammer - The Making Of

Hack In The Box Security Conference via YouTube Direct link

Wrapping Up

35 of 37

35 of 37

Wrapping Up

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Drammer - The Making Of

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 A Little Background
  3. 3 Rawhammer
  4. 4 Bypass the CPU cache
  5. 5 Select the Aggressor Rows
  6. 6 Rowhammer Exploitation
  7. 7 Hammering a Needle in the Software Stack
  8. 8 A Quick Google Search
  9. 9 Arrival at Santa Barbara
  10. 10 Benchmarking DRAM Bandwidth
  11. 11 Kernel Module
  12. 12 A piece of art: meh.cc
  13. 13 Debug, Hammer, Debug
  14. 14 E-Mail From The Bos
  15. 15 Flipping Bits On The Beach
  16. 16 Downward Spiral
  17. 17 The cacheflush System Call
  18. 18 Pointer Chasing
  19. 19 Flipping Bits By Executing Code
  20. 20 Cache Maintenance Operations
  21. 21 Martina
  22. 22 Memory templating
  23. 23 Scientific Value
  24. 24 Land sensitive data
  25. 25 a. Exhaust Large Chunks
  26. 26 b. Find a Bit Flip
  27. 27 Release Vulnerable Chunk
  28. 28 Exhaust Rows (again)
  29. 29 a. Release Vulnerable Row
  30. 30 b. Release Large Chunks
  31. 31 Allocate Pages until we hit the vulnerable now
  32. 32 Padding
  33. 33 Map a Page Table
  34. 34 Evaluation
  35. 35 Wrapping Up
  36. 36 Disclosure
  37. 37 Drammer

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.