Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Drammer - The Making Of

Hack In The Box Security Conference via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course teaches learners about the Drammer attack, which exploits the Rowhammer hardware vulnerability on Android devices. The course covers the technical aspects of Drammer and provides insights into the creation process from a hacker's perspective. The skills taught include understanding Rowhammer, bypassing the CPU cache, selecting aggressor rows, and exploiting Rowhammer. The teaching method involves a technical storytelling approach. The course is intended for individuals interested in cybersecurity, hardware vulnerabilities, and mobile device security.

Syllabus

Intro
A Little Background
Rawhammer
Bypass the CPU cache
Select the Aggressor Rows
Rowhammer Exploitation
Hammering a Needle in the Software Stack
A Quick Google Search
Arrival at Santa Barbara
Benchmarking DRAM Bandwidth
Kernel Module
A piece of art: meh.cc
Debug, Hammer, Debug
E-Mail From The Bos
Flipping Bits On The Beach
Downward Spiral
The cacheflush System Call
Pointer Chasing
Flipping Bits By Executing Code
Cache Maintenance Operations
Martina
Memory templating
Scientific Value
Land sensitive data
a. Exhaust Large Chunks
b. Find a Bit Flip
Release Vulnerable Chunk
Exhaust Rows (again)
a. Release Vulnerable Row
b. Release Large Chunks
Allocate Pages until we hit the vulnerable now
Padding
Map a Page Table
Evaluation
Wrapping Up
Disclosure
Drammer

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Drammer - The Making Of

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.