memory   49884

« earlier    

Attacking a co-hosted VM: A hacker, a hammer and two memory modules - This is Security :: by Stormshield
Row-hammer is hardware bug that can cause bit-flips in physical RAM. Mark Seaborn and Thomas Dullien were the first to exploit the DRAM row-hammer bug to gain kernel privileges. Kaveh Razavi et al. pushed the exploitation of row-hammer bugs to the next level. They abused an OS feature – memory de-duplication – to surgically flip bits in a controlled way. They succeeded in flipping bits in memory loaded sensitive files (e.g. authorized_keys) assuming they know their contents. By weakening RSA moduli in authorized_keys file, they were able to generate corresponding private keys and authenticate on a co-hosted victim VM.

In this post, we aim to showcase a different attack scenario. Instead of corrupting memory loaded files, we chose to corrupt the state of a running program. The libpam is an attractive target since it provides authentication mechanisms on widely deployed *nix systems.

By running an instance of a row-hammer attack on an attacker VM, we were able to successfully authenticate on an adjacent victim VM by corrupting the state of module.
security  research  memory 
16 hours ago by Chirael
How JavaScript works: memory management how to handle 4 common memory leaks
A few weeks ago we started a series aimed at digging deeper into JavaScript and how it actually works: we thought that by knowing the building blocks of JavaScript and how they come to play together…
javascript  js  inner  working  memorymanagement  performance  memory  leak 
yesterday by gilberto5757

« earlier    

related tags

****  2002  2015  2016  2017-10-20  2017  246  5words  aasm  abuse  access  adult-learning  aim  algorithms  allocation  alzheimers  amen  analysis  anki  aol  apple  archive  archives  arduino  ariandnesthread  article  artificialintelligence  attention  audiovisual  autism  ayumu  backtracking  benjamindoxtdator  bestpractice  bigdata  billiejeanking  blog  bobbyriggs  book  brain  brand  brands  bug  by:robinsonmeyer  c++  ceph  chat  chess  chimpanzee  chromium  civilwar  cloud  cloze-deletion  clr  code  cognition  cognitive  collective_attention  command  communication  company  comparison  compressed  computer-science  computing  concurrency  context-clues  coordination  cpu  crashplan  crisis  cross-arm  crossover  cryptography  csrblogcomment  culture  customer  dance  dascalescu  data  database  debugging  deep-learning  dementia  design  development  devices  diet  dimm  disasters  discard  discussion  disposable  distributed  diversity  docker  documentation  donnaharaway  dotnet  drawing  economics  edtech  education  eeprom  electronics  emotion  emotional  engagement  ephemerality  erlang  essay  example  exercise  exploitation  facebook  fake_news  favorites  feminism  film  film:battleofthesexes  finite  flash  forensics  forgetfulness  formulating-knowledge  freeze  friendship  function  gaming  garbage-collection  garbage  garbagecollection  genderequality  genderidentity  genderroles  gilest  go  golang  google  guide  hardware  hash-function  hash  hashing  hazards  health  heap  highly-superior-autobiographical-memory  history  howto  hsam  identity  important  in-memory  in  information  infrastructure  inner  instagram  intelligence  interesting  iphone  is  java  javascript  js  jvm  kellereasterling  kernel  ketogenic  keys  km  knowledge-management  knowledge  labyrinth  leak  leaks  learning  lgbtq  life  lifehacks  likes  links  linux  liquidweb  log  logging  logo  logos  loss  low  macos  magnesium  manipulation  map  media  medialiteracy  medical-conditions  memoirs  memories  memorymanagement  memorypalace  meter  misinformation  misogyny  monitoring  monuments  motion  multitasking  music  nature  neuroscience  no  node  nostalgia  notifications  nyc  on:supermemo  operating  optimization  osd  pack  pamięć  parenting  peer-reviewed  performance  photography  pitfalls  pmap  podcast  poem  poetry  pprof  presentationofself  preservation  price_m  primer  print  processing  productivity  profiling  programming  promise  protist  prufrock  psychology  python  rails  ram  reading  rebecca-sharrock  record  reference  regenerative  relationship  research  retrieval  retrival  ruby  rust  safari  safety  sar  satisfaction  saudade  science  scifi  security  skills  slime  slimemold  smartphones  snapchat  software  source  sourcecode  spaced-repetition  spark  spatial  storage  stuff  sysadmin  system  szympans  teaching  technology  tenderlove  tennis  test  texas  text  thegeekstuff  there  theseus  thread  top  toshiyukinakagaki  towatch  trace  troubleshooting  trust  truth  tutorial  tutorials  tv  twitter-moments  twitter  twitterthread  types  ubuntu  unconscious  unlearning  usa  usage  usb  utility  utilization  video  vivo  wikientry  windows  working  yasseri_t  you  zero-allocation  zero  ★★★★☆ 

Copy this bookmark: