• ClipSaver
ClipSaver
Русские видео
  • Смешные видео
  • Приколы
  • Обзоры
  • Новости
  • Тесты
  • Спорт
  • Любовь
  • Музыка
  • Разное
Сейчас в тренде
  • Фейгин лайф
  • Три кота
  • Самвел адамян
  • А4 ютуб
  • скачать бит
  • гитара с нуля
Иностранные видео
  • Funny Babies
  • Funny Sports
  • Funny Animals
  • Funny Pranks
  • Funny Magic
  • Funny Vines
  • Funny Virals
  • Funny K-Pop

38C3 - Ten Years of Rowhammer: A Retrospect (and Path to the Future) скачать в хорошем качестве

38C3 - Ten Years of Rowhammer: A Retrospect (and Path to the Future) 4 months ago

2024

38C3

38c3

38c3 eng

38c3 ov

Daniel Gruss

Day 4

Florian Adamsky

Martin Heckel

Saal 1

Security

ccc

chaos

communication

congress

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
38C3 - Ten Years of Rowhammer: A Retrospect (and Path to the Future)
  • Поделиться ВК
  • Поделиться в ОК
  •  
  •  


Скачать видео с ютуб по ссылке или смотреть без блокировок на сайте: 38C3 - Ten Years of Rowhammer: A Retrospect (and Path to the Future) в качестве 4k

У нас вы можете посмотреть бесплатно 38C3 - Ten Years of Rowhammer: A Retrospect (and Path to the Future) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:

  • Информация по загрузке:

Скачать mp3 с ютуба отдельным файлом. Бесплатный рингтон 38C3 - Ten Years of Rowhammer: A Retrospect (and Path to the Future) в формате MP3:


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



38C3 - Ten Years of Rowhammer: A Retrospect (and Path to the Future)

The density of memory cells in modern DRAM is so high that disturbance errors, like the Rowhammer effect, have become quite frequent. An attacker can exploit Rowhammer to flip bits in inaccessible memory locations by reading the contents of nearby accessible memory rows. Since its discovery in 2014, we have seen a cat-and-mouse security game with a continuous stream of new attacks and new defenses. Now, in 2024, exactly 10 years after Rowhammer was discovered, it is time to look back and reflect on the progress we have made and give an outlook on the future. Additionally, we will present an open-source framework to check if your system is vulnerable to Rowhammer. In 2014, Kim et al. reported a new disturbance effect in modern DRAM that they called Rowhammer. The Rowhammer effect flips bits in inaccessible memory locations just by reading the content of nearby memory locations that are attacker-accessible. They trigger the Rowhammer effect by accessing memory locations at a high frequency, using memory accesses and flushes. The root problem behind Rowhammer is the continuous increase in cell density in modern DRAM. In early 2015, Seaborn and Dullien were the first to demonstrate the security impact of this new disturbance effect. In two different exploit variants, they demonstrated privilege escalation from the Google Chrome NaCl sandbox to native code execution and from unprivileged native code execution to kernel privileges. Later, in 2015, Gruss et al. demonstrated that this effect can even be triggered from JavaScript, which they presented in their talk "Rowhammer.js: Root privileges for web apps?" at 32C3. Now, in 2024, it is precisely 10 years after Rowhammer was discovered. Thus, we believe it is time to look back and reflect on the progress we have made. We have seen a seemingly endless cat-and-mouse security game with a constant stream of new attacks and new defenses. We will discuss the milestone works throughout the last 10 years, including various mitigations (making certain instructions illegal, ECC, doubled-refresh rate, pTRR, TRR) and how they have been bypassed. We show that new Rowhammer attacks pushed the boundaries further with each defense and challenge. While initial attacks required native code on Intel x86 with DDR3 memory, subsequent attacks have also been demonstrated on DDR4 and, more recently, DDR5. Attacks have also been demonstrated on mobile Arm processors and AMD x86 desktop processors. Furthermore, instead of native code, attacks from sandboxed JavaScript or even remote attacks via network have been demonstrated as well. Furthermore, we will discuss how the Rowhammer effect can be used to leak memory directly, as well as related effects such as Rowpress. We will discuss these research results and show how they are connected. We will then talk about the lessons learned and derive areas around the Rowhammer effect that have not received sufficient attention yet. We will outline what the future of DRAM disturbance effects may look like, covering more recent effects and trends in computer systems and DRAM technology. Finally, an important aspect of our talk is that we invite everyone to contribute to solving one of the biggest unanswered questions about Rowhammer: What is the real-world prevalence of the Rowhammer effect? How many systems, in their current configurations, are vulnerable to Rowhammer? As large-scale studies with hundreds to thousands of systems are not easy to perform, such a study has not yet been performed. Therefore, we developed a new framework to check if your system is vulnerable to Rowhammer, incorporating the state-of-the-art Rowhammer techniques and tools. Thus, we invite everyone to participate in this unique opportunity at 38C3 to join forces and close this research gap together. Daniel Gruss, Martin Heckel, Florian Adamsky https://events.ccc.de/congress/2024/h... #38c3 #Security Licensed to the public under http://creativecommons.org/licenses/b...

Comments
  • 38C3 - Moving with feelings: Behind the scenes of a one man show mobile & fiber operator in Spain 4 months ago
    38C3 - Moving with feelings: Behind the scenes of a one man show mobile & fiber operator in Spain
    Опубликовано: 4 months ago
    915
  • 37C3 -  Operation Triangulation: What You Get When Attack iPhones of Researchers 1 year ago
    37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers
    Опубликовано: 1 year ago
    75994
  • Web Server Concepts and Examples 4 years ago
    Web Server Concepts and Examples
    Опубликовано: 4 years ago
    297477
  • Redis Crash Course - the What, Why and How to use Redis as your primary database 3 years ago
    Redis Crash Course - the What, Why and How to use Redis as your primary database
    Опубликовано: 3 years ago
    492024
  • Seminar in Computer Architecture - Lecture 3: RowHammer (Fall 2023) 1 year ago
    Seminar in Computer Architecture - Lecture 3: RowHammer (Fall 2023)
    Опубликовано: 1 year ago
    1231
  • Introduction to RTOS Part 1 - What is a Real-Time Operating System (RTOS)? | Digi-Key Electronics 4 years ago
    Introduction to RTOS Part 1 - What is a Real-Time Operating System (RTOS)? | Digi-Key Electronics
    Опубликовано: 4 years ago
    980001
  • But, what is Virtual Memory? 1 year ago
    But, what is Virtual Memory?
    Опубликовано: 1 year ago
    414520
  • What do tech pioneers think about the AI revolution? - BBC World Service 9 months ago
    What do tech pioneers think about the AI revolution? - BBC World Service
    Опубликовано: 9 months ago
    1656759
  • Explaining RISC-V: An x86 & ARM Alternative 3 years ago
    Explaining RISC-V: An x86 & ARM Alternative
    Опубликовано: 3 years ago
    507550
  • Ollama Course – Build AI Apps Locally 6 months ago
    Ollama Course – Build AI Apps Locally
    Опубликовано: 6 months ago
    394851

Контактный email для правообладателей: [email protected] © 2017 - 2025

Отказ от ответственности - Disclaimer Правообладателям - DMCA Условия использования сайта - TOS



Карта сайта 1 Карта сайта 2 Карта сайта 3 Карта сайта 4 Карта сайта 5