Buzz

Rowhammer variant RAMBleed allows attackers to steal secrets from RAM

Researchers have devised a new attack that allows unprivileged code running on computers to steal secrets, such as cryptographic keys, that are stored in what should be protected memory regions. The attack is possible because of a known design issue with modern DRAM chips that has been exploited in the past to modify protected data.

Dubbed RAMBleed, the new attack is the work of researchers Andrew Kwong and Daniel Genkin from the University of Michigan, Daniel Gruss from the Graz University of Technology and Yuval Yarom from University of Adelaide and Data61. Using the new technique, the researchers were able to extract an RSA 2048-bit signing key from an OpenSSH server using code running with user-level privileges.

To read this article in full, please click here

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

one + eight =

This site uses Akismet to reduce spam. Learn how your comment data is processed.