Back to home
Technology

Modern memory is still vulnerable to Rowhammer vulnerabilities — Phoenix root privilege escalation attack proves that Rowhammer still smashes DDR5 security to bits

Source

Tom's Hardware

Published

TL;DR

AI Generated

Scientists from ETH Zürich and Google have demonstrated a new attack named Phoenix on DDR5 RAM, exploiting Rowhammer vulnerabilities for high-level privilege escalation. The attack bypasses DDR5's defenses and poses a significant threat to data security, especially in servers. While no foolproof mitigation exists yet, increasing row refresh rates can make attacks less likely, albeit with a performance trade-off. Google and JEDEC are working on standards like PRAC to address these vulnerabilities in future memory revisions. The research findings have been shared with relevant stakeholders, and efforts are underway to enhance RAM security.

Read Full Article

Similar Articles

Nvidia chips become the first GPUs to fall to Rowhammer bit-flip attacks

Nvidia chips become the first GPUs to fall to Rowhammer bit-flip attacks

Nvidia's RTX A6000 GPU is vulnerable to Rowhammer attacks, where hackers can manipulate data stored in memory by exploiting weaknesses in DRAM chip modules. Nvidia is recommending a mitigation that could reduce performance by up to 10% to protect users from potential exploits that could compromise work projects. This marks the first time GPUs have been targeted by Rowhammer attacks, which were previously demonstrated only against memory chips for CPUs. The vulnerability poses a risk to users of high-performance computing GPUs, prompting Nvidia to take action to safeguard against potential compromises.

Ars Technica
Dr. L.C. Lu on TSMC Advanced Technology Design Solutions

Dr. L.C. Lu on TSMC Advanced Technology Design Solutions

Dr. L.C. Lu, a key figure at TSMC, focuses on design-technology co-optimization, packaging innovations, and AI-driven methodologies for next-gen semiconductor systems. TSMC emphasizes DTCO and DDCL innovations for scaling from N5 to A14 nodes, with NanoFlex and NanoFlex Pro architectures offering efficiency gains. N2P and N2U nodes incorporate advanced DTCO and power delivery optimizations, with hybrid dual-rail architectures achieving significant energy savings. TSMC collaborates with EDA partners for AI integration, enhancing productivity and design quality. Advanced packaging technologies like CoWoS and SoIC play a crucial role in enabling AI scaling, with memory bandwidth and interconnect performance scaling aggressively. TSMC addresses power delivery and thermal management challenges in AI systems through advanced solutions. TSMC's advancements in design methodologies and AI-driven automation promise improved productivity and scalability in chip-package co-design.

SemiWiki
MindsEye's sabotage mission is being slammed as dull and pointless

MindsEye's sabotage mission is being slammed as dull and pointless

Build A Rocket Boy accuses individuals of sabotaging MindsEye's launch, spending over €1 million on damaging efforts. The studio integrates the controversy into a new in-game mission, Blacklist, to showcase evidence of sabotage to players. However, reports describe the mission as lackluster and failing to deliver a compelling narrative. Critics attribute the launch issues to internal problems, such as management and design decisions, casting doubt on the sabotage claims. The saga continues as MindsEye's post-launch turmoil unfolds.

TweakTown
3DPrint.com

The Additive Chicken Coop, Part II: Rescoping

The article discusses the second part of the Additive Chicken Coop project, focusing on rescaling the project. It highlights the challenges faced in enabling JavaScript and cookies to continue reading the content. The article provides insights into the technical aspects of the project and the strategies employed to address the issues encountered during the rescaling process.

3DPrint.com

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.