Rowhammer: The Data Theft Technique that Could Potentially Make Everything Vulnerable

It is quite a complicated concept to understand how data hacks happen and how they are evolving to become more and more sophisticated to make data theft seamless. We aren't even completely safe on the platforms we use online.

Rowhammer attacks are fiendishly technical. They involve strategically executing a program over and over on a "row" of transistors in a computer's memory chip. The idea is to "hammer" that row, until it leaks some electricity into the adjacent row. That leakage can cause a bit in the target row to "flip" from one position to another, slightly altering the data stored in memory.
Previously, Rowhammer was understood to impact typical random access memory used in many off-the-shelf computers. Rowhammer has also been shown to threaten the memory in Android phones. But on Wednesday, researchers in the VUSec research group at Vrije Universiteit in Amsterdam published details of a next-generation Rowhammer ambush that can target what's known as "error-correcting code" memory.

Now, ECC memory is increasingly found in a diverse array of devices which means that if Rowhammer is able to bypass ECC, we are in for some even more dangerous data breaches in the future.

(Image credit: La Tigre)


Comments (1)

Newest 1
Newest 1 Comment

Pinatas always disturb me. They are de rigueur for birthday parties here in New Mexico, which sets up the horrible scenario: Excited children, candy, a stick being swung by a blindfolded child. The Pinata opens, and kids rush in, heedless of the blindfolded kid with the stick. It's a recipe for disaster.
There's also the lesson of Pinatas: Good treats come from the cruel punishment of animals.
Abusive comment hidden. (Show it anyway.)
  1 reply
Login to comment.
Email This Post to a Friend
"Rowhammer: The Data Theft Technique that Could Potentially Make Everything Vulnerable"

Separate multiple emails with a comma. Limit 5.

 

Success! Your email has been sent!

close window
X

This website uses cookies.

This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our Privacy Policy.

I agree
 
Learn More