, 7 tweets, 3 min read Read on Twitter
New 'RAMBleed' Rowhammer attack can now steal data, not just alter it

RAMBleed uses Rowhammer attacks in a clever way that can allow attackers to infer data stored inside a RAM card, not just alter it for LPE attacks, as it was possible until now
The RAMBleed attack required researchers to come up with new techniques for manipulating RAM and memory allocations, in order for the attacker to control how data was mapped inside a physical RAM card
In practice, this allowed researchers to steal an RSA private key from a SSH service on a Linux server
More info on the RAMBleed website: rambleed.com

And research paper: rambleed.com/docs/20190603-…
Also, a quick overview of all the previous Rowhammer attack techniques. Boy, there sure is a lot of them.
Also, something of note. ECC-protected RAM isn't safe. It actually helps attackers.

Go figure.
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Catalin Cimpanu
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!