According to the report, despite the security mechanisms present in DRAM Target Row Refresh (TRR), some of the latest DDR4 modules remain exposed to bit changes derived from conditions derived from a Rowhammer scenario.
The new attack variant exploits high-level knowledge of cache replacement policies to generate optimal access patterns for multifaceted eviction-based Rowhammer. To bypass TRR mitigations, SMASH carefully schedules cache hits and failures to activate the multifaceted Rowhammer bit.
As you will remember, the term Rowhammer refers to a class of exploits that abuse a peculiarity of hardware design in DDR4 systems. RAM cards store data within what are called memory cells arranged on the silicon chip of the RAM in the form of an array.
Due to the natural discharge levels of capacitors, memory cells tend to lose their state over time, so they require periodic reading and rewriting of each cell to restore the capacitor load to its original level. On the other hand, increasing the density of DRAM integrated circuits allows for increased rates of electromagnetic interactions between memory cells and an increased chance of sensitive data loss.
A few years ago a group of experts discovered that, by repeatedly performing quick read/write operations on a row of memory, it was possible to induce electrical disturbance that would alter data stored in nearby rows of memory. Since then multiple variants of this attack have appeared, so manufacturers began to develop sophisticated prevention methods.
Investigators released a video to prove the attack, as well as announcing that their full investigation will be published shortly. To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.