• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

492492492492492492492492492492492492492492492492

Elixer

Lifer
http://arstechnica.com/security/201...4-memory-shown-to-be-vulnerable-to-rowhammer/

Physical weaknesses in memory chips that make computers and servers susceptible to hack attacks dubbed "Rowhammer" are more exploitable than previously thought and extend to DDR4 modules, not just DDR3, according to a recently published research paper.
Interesting stuff...

and in case you don't want to read the whole article and are wondering what is up with the title...
Unlike many previous Rowhammer attacks, the ones carried out by Third I/O didn't just hammer targeted regions with all 0s or all 1s. Rather, they subjected DIMMs to a barrage of random data patterns that often proved more efficient. In one case, they stumbled on what they called a "killer data pattern" that in some tests achieved 50 percent more bit flips than a typical pattern. In hexadecimal form, the pattern is:

492492492492492492492492492492492492492492492492
 
Last week, researchers published a bitflipping method that relies on JavaScript code used by standard browsers. Rowhammer.js, as the new proof-of-concept attack has been dubbed, is slow, and so far it only works on a Lenovo x230 Ivy Bridge Laptop running default settings and on a Haswell CPU if its refresh interval is increased as gamers sometimes do to increase system performance. And even then, the researchers were unable to use the attack to gain root access. Despite the limitations, however, the modified attack does what has never been done before—achieving a bitflipping attack using nothing more than the JavaScript allowed by every modern browser.

hooray for java!

flash and java.

the end of humanity.
 
The hex code converted looks like this: I$’I$’I$’I$’I$’I$’I$’I$’

Oh yeah. Hurry for NoScript!
 
I wonder if x87 will add silicon secured memory like the SPARC M7 cpu. Its a super cool feature.

I thought that Intel was introducing a similar feature, but I didn't understand what SPARC SMM was.

SMM is a very clever tool for detecting buffer overruns, and mitigating similar buffer misuse vulnerabilities.

Intel is introducing SGX with Kaby Lake which does something different, but with a similar goal. In this case, it allows an application to allocate "secure memory", data in secure memory can only be accessed by code within the same secure "enclave", and a special call is needed to execute this code, and the hardware is able to verify the code's digital signature to ensure that the code has not been tampered with. Any attempt by the application, a driver or even the OS kernel to access this memory will trigger an invalid page fault. To protect against a malicious DMA device, the MMU provides transparent hardware encryption so that the contents of a secure enclave are encrypted before being stored in system DRAM.
 
Back
Top