PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses

07/17/2020
by   Zhi Zhang, et al.
0

Rowhammer is a hardware vulnerability in DRAM memory, where repeated access to memory can induce bit flips in neighboring memory locations. Being a hardware vulnerability, rowhammer bypasses all of the system memory protection, allowing adversaries to compromise the integrity and confidentiality of data. Rowhammer attacks have shown to enable privilege escalation, sandbox escape, and cryptographic key disclosures. Recently, several proposals suggest exploiting the spatial proximity between the accessed memory location and the location of the bit flip for a defense against rowhammer. These all aim to deny the attacker's permission to access memory locations near sensitive data. In this paper, we question the core assumption underlying these defenses. We present PThammer, a confused-deputy attack that causes accesses to memory locations that the attacker is not allowed to access. Specifically, PThammer exploits the address translation process of modern processors, inducing the processor to generate frequent accesses to protected memory locations. We implement PThammer, demonstrating that it is a viable attack, resulting in a system compromise (e.g., kernel privilege escalation). We further evaluate the effectiveness of proposed software-only defenses showing that PThammer can overcome those.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/06/2019

TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique

Rowhammer exploits frequently access specific DRAM rows (i.e., hammer ro...
research
05/13/2018

Nethammer: Inducing Rowhammer Faults through Network Requests

A fundamental assumption in software security is that memory contents do...
research
01/09/2022

A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM

Rowhammer has drawn much attention from both academia and industry in th...
research
05/19/2019

Safe and Chaotic Compilation for Hidden Deterministic Hardware Aliasing

Hardware aliasing occurs when the same logical address can access differ...
research
07/20/2018

Spectre Returns! Speculation Attacks using the Return Stack Buffer

The recent Spectre attacks exploit speculative execution, a pervasively ...
research
01/03/2018

Meltdown

The security of computer systems fundamentally relies on memory isolatio...
research
02/15/2023

Field-sensitive Data Flow Integrity

Although numerous defenses against memory vulnerability exploits have be...

Please sign up or login with your details

Forgot password? Click here to reset