• Simplify Your Signup – No Extra Passwords Needed!Connect instantly with your favorite accounts:
    Facebook • Google • GitHub • MicrosoftOne click, and you're in – forget memorizing yet another password!Join Today and Unlock Exclusive Perks: Hidden Members Area – Discover secret

    links, bonus forums, and insider content.

    Reduced Ads – Enjoy a cleaner, faster experience.




    Sign up now and level up your access!

New Rowhammer attacks give complete control of machines running Nvidia GPUs

  • Thread starter Thread starter Dan Goodin
  • Start date Start date
D

Dan Goodin

The cost of high-performance GPUs, typically $8,000 or more, means they are frequently shared among dozens of users in cloud environments. Two new attacks demonstrate how a malicious user can gain full root control of a host machine by performing novel Rowhammer attacks on high-performance GPU cards made by Nvidia.

The attacks exploit memory hardware’s increasing susceptibility to bit flips, in which 0s stored in memory switch to 1s and vice versa. In , researchers first demonstrated that repeated, rapid access—or “hammering”—of memory hardware known as creates electrical disturbances that flip bits. A , a different research team showed that by targeting specific DRAM rows storing sensitive data, an attacker could exploit the phenomenon to escalate an unprivileged user to root or evade security sandbox protections. Both attacks targeted DDR3 generations of DRAM.

From CPU to GPU: Rowhammer's decade-long journey​


Over the past decade, dozens of newer Rowhammer attacks have evolved to, among other things:





 
RackNerd Leaderboard Banner

Back
Top