Hackers Using RowHammer Vulnerability To Exploit Physics

View this thread on: d.buzz | hive.blog | peakd.com | ecency.com
·@hopf-orbifolds·
0.000 HBD
Hackers Using RowHammer Vulnerability To Exploit Physics
![](http://1.bp.blogspot.com/-AJYUuYpoz8I/VP6-tU0wkWI/AAAAAAAAiLU/O3P3nwO9W2g/s1600/dram-rowHammer-vulnerability.jpg)

**RowHammer is the name of the technique which a group of security researchers developed which could hack into the hardware of the computer. It works by running a program on the target computer, which repeatedly overwrites a row of transistors in its DRAM memory. This hammering effect leads to a glitch, where the electric charge leaks onto the neighboring rows. The leaked charge in turn causes the bits to change from one to zero and vice versa, giving access to the whole new level of the computer’s operating system.** 

**Such a technique that breaks into the fundamental level of computers has never been used before.**

**Furthermore, this technique has been used to hack into cloud computing services such as from Amazon to partition computing resources on cloud servers into isolated virtual machines. This duplication of memory combines several identical parts of the virtual machines memory into a single place in the memory of a physical computer. They can in turn be used to write data on the virtual machines memory and then use the data to hammer the physical transistors not only on those bits of data, but identical bits on someone’s else virtual machines running on the computer.** 

**Such loopholes in computer hardware could open up a whole new field of research where adversarial input from the software codes could be used to manipulate/disrupt computers physically.**
**This is truly a breakthrough in Computer Security!!!**

[Image Credit - Hackers News](http://1.bp.blogspot.com/-AJYUuYpoz8I/VP6-tU0wkWI/AAAAAAAAiLU/O3P3nwO9W2g/s1600/dram-rowHammer-vulnerability.jpg)
👍 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,