In 2015, Researchers at Google they found problems can be used in real time. Now a team of Google computer scientists have shown that the problem has gotten worse, mainly due to the redesign of the chips.
Rowhammer is a destructive method that uses electricity on memory computers (known as DRAM) to decrypt or disseminate data. In an attack, thieves run the same program over and over on the “line” of DRAM transistors to “carry” the line until it flashes power on the neighboring line. When done in a straight line, the loss can be twisted slightly in the next row of transistors from 1 to 0 or vice versa. By simply setting up a complete network, the attacker can begin to use what he wants to track and access digital.
In the years since first In a 2014 Rowhammer study, weapons manufacturers have added cuts that look at adjacent lines and potentially questionable features. But as the chips get smaller, the complications that result from blocking a given line can overwhelm two or more lines. Think about Gallagher beats a watermelon. You can protect the front of the audience by giving them all plastic ponchos. But if they are fully open, and the crowd is full, the ribs and the inside can connect to the face two or three deep lines.
Researchers they called their attack “Half-Double,” and note that this concept was not applicable to the older generations of DRAM when the horizontal lines were a little farther away. As everything is left Moore’s law carries transistors very closely, however, the risk of Rowhammer throwers increases.
“This is the result of miniaturization,” Google researchers told WIRED in response to a question. “In our experiment with old DDR4 chips, this method did not work well. We are releasing this study today to improve understanding of this risk. We hope it will continue to discuss what can be reduced to make it more sustainable and effective. ”
Google disclosed the findings to the semiconductor marketing agency JEDEC, which printed two reduction-temporal variance. And the researchers have been working closely with their partners in the industry to raise awareness of the problem. But it will take time for machine builders to understand its meaning.
“Imagine your home is huge,” said Daniel Moghimi, a postgraduate student at the University of California, San Diego. studied Rowhammer and the revolt of small things. “If a neighbor who owns a large house plays loud music, you can probably hear it in your home, but not from three doors down. But when you live in a house where houses are crowded together, the music disturbs your neighbors. It is the same idea with the number of DRAM cells and their proximity. “
A complete overhaul will also require re-consideration of how chips are made, and may apply to future generations of DRAM. Going back to Mighimi’s illustration, it is much easier to build a new house with strong walls and screens than to build an existing house.
Moghimi says researchers have already understood the dangers, but Google’s findings also indicate a strong, real attack. “It turns out it’s more effective than most people think,” he says.
This is not the first time the Rowhammer attack has seemed to end with a roar. Researchers at Vrije Universiteit Amsterdam are repeatedly showed in the last 18 months that modern wildlife protection against the Rowhammer threats can be overcome. But Google’s findings provide another warning that advances in the growth and efficiency of memory chips could come with new threats from Rowhammer.
These cutting techniques require some skill and opportunity to do this directly. Given the Rowhammer visibility is present on all computer hardware out there, however, its development needs to be done seriously.
Many Great Stories