Half-Double: Hammering From the Next Row Over

Andreas Kogler, Jonas Juffinger, Salman Qazi, Yoongu Kim, Moritz Lipp*, Nicolas Boichat, Eric Shiu, Mattias Nissler, Daniel Gruss

*Korrespondierende/r Autor/-in für diese Arbeit

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

Rowhammer is a vulnerability in modern DRAM where repeated accesses to one row (the aggressor) give off electrical disturbance whose cumulative effect flips the bits in an adjacent row (the victim). Consequently, Rowhammer defenses presuppose the adjacency of aggressor-victim pairs, including those in LPDDR4 and DDR4, most notably TRR.

In this paper, we present Half-Double, an escalation of Rowhammer to rows beyond immediate neighbors. Using Half-Double, we induce errors in a victim by combining many accesses to a distance-2 row with just a few to a distance-1 row. Our experiments show that the cumulative effect of these leads to a sufficient electrical disturbance in the victim row, inducing bit flips. We demonstrate the practical relevance of Half-Double in a proof-of-concept attack on a fully up-to-date system. We use side channels, a new technique called BlindHammering, a new spraying technique, and a Spectre attack in our end-to-end Half-Double Attack. On recent Chromebooks with ECC- and TRR-protected LPDDR4x memory, the attack takes less than 45 minutes on average
Originalspracheenglisch
TitelProceedings of the 31st USENIX Security Symposium
Herausgeber (Verlag)USENIX Association
Seiten3807-3824
ISBN (elektronisch)978-1-939133-31-1
PublikationsstatusVeröffentlicht - 10 Aug. 2022
Veranstaltung31st USENIX Security Symposium: USENIX Security 2022 - Boston, USA / Vereinigte Staaten
Dauer: 10 Aug. 202212 Aug. 2022
Konferenznummer: 31

Konferenz

Konferenz31st USENIX Security Symposium
KurztitelUSENIX '22
Land/GebietUSA / Vereinigte Staaten
OrtBoston
Zeitraum10/08/2212/08/22

Dieses zitieren