Skip to Main content Skip to Navigation
Conference papers

Nethammer: Inducing Rowhammer Faults through Network Requests

Abstract : In this paper, we present Nethammer, a remote Rowhammer attack without a single attacker-controlled line of code on the targeted system, i.e., not even JavaScript. Nethammer works on commodity consumer-grade systems that either are protected with quality-of-service techniques like Intel CAT or that use uncached memory, flush instructions, or non-temporal instructions while handling network requests (e.g., for interaction with the network device). We demonstrate that the frequency of the cache misses is in all three cases high enough to induce bit flips. Our evaluation showed that depending on the location, the bit flip compromises either the security and integrity of the system and the data of its users, or it can leave persistent damage on the system, i.e., persistent denial of service. We invalidate threat models of Rowhammer defenses building upon the assumption of a local attacker. Consequently, we show that most state-of-the-art defenses do not affect our attack. In particular, we demonstrate that target-row-refresh (TRR) implemented in DDR4 has no aggravating effect on local or remote Rowhammer attacks.
Document type :
Conference papers
Complete list of metadatas

Cited literature [58 references]  Display  Hide  Download

https://hal.inria.fr/hal-01872588
Contributor : Clémentine Maurice <>
Submitted on : Tuesday, November 10, 2020 - 12:11:01 PM
Last modification on : Thursday, November 12, 2020 - 3:27:58 AM

File

silm20_lipp.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-01872588, version 2
  • ARXIV : 1805.04956

Citation

Moritz Lipp, Michael Schwarz, Lukas Raab, Lukas Lamster, Misiker Tadesse Aga, et al.. Nethammer: Inducing Rowhammer Faults through Network Requests. EuroS&P Workshops 2020, Sep 2020, Genova, Italy. ⟨hal-01872588v2⟩

Share

Metrics

Record views

29

Files downloads

83