Full Disclosure mailing list archives
Re: D-RamPage: POC for zero-risk row-hammer exploitation
From: halfdog <me () halfdog net>
Date: Sat, 21 Mar 2015 08:39:53 +0000
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello List, I've improved the code and made most of the source-code parameters also configurable via the command line. I've also added the row-hammer assembly code itself. The problem: * The page fixation code is tested and seems to be 100% reliable and quite fast. * The row-hammer code is completely untested as I have no 64-bit hardware affected by rowhammer. Hence the statistics optimization code is incomplete. WARNING: THE CODE IS UNTESTED AND LIKELY TO BE HARMFULL. STILL I WOULD REQUIRE THE STATS DATA TO GET COMPLETELY SAFE 100% SUCCESS ESCALATION. WOULD SOMEONE AWARE OF THE RISK BE WILLING TO ASSIST IN TESTING? See also http://www.halfdog.net/Security/2015/SafeRowhammerPrivilegeEscalation/ hd - -- http://www.halfdog.net/ PGP: 156A AE98 B91F 0114 FE88 2BD8 C459 9386 feed a bee -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlUNLlMACgkQxFmThv7tq+5KlwCghPhbAcr03OK0JpyV3TtU9dp9 d9UAniCtO/yyMGoAu2+RF5QTwxRqWl9V =IJn0 -----END PGP SIGNATURE----- _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Current thread:
- D-RamPage: POC for zero-risk row-hammer exploitation halfdog (Mar 16)
- Re: D-RamPage: POC for zero-risk row-hammer exploitation halfdog (Mar 22)