|
||
von makai am 13.06.19 um 16:39 | ||
Antwort auf: Re:RAMBleed: Reading Bits in Memory Without Accessing Them von Border | ||
>>https://rambleed.com/
>> >>As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. However, RAMBleed can be used for reading other data as well. >> >>Ja geil... > >Dann aber fix mal schnell alles auf DDR4 hochziehen. Hab's eben mal dem Admin gezeigt. Weisere Worte wurden selten gesprochen: „Oh, Scheiße!“ ;) DDR4 supports a defensive technique called Targeted Row Refresh, but its efficacy is uncertain https://www.theregister.co.uk/2019/06/11/rambleed_rowhammer_attack/ Mal schauen was da noch kommt. |
||
< antworten > |