Rowhammer security exploit: Why a new security attack is truly terrifying.

This Computer Attack Is Amazing, Frightening, and Unlike Anything Else. It’s Called Rowhammer.

Decoding the tech world.
July 28 2015 11:25 AM

Lo, Rowhammer!

Security researchers just revealed a computer vulnerability that’s frightening, amazing, and unlike anything else.

150727_BIT_Rowhammer

Photo illustration by Lisa Larson-Walker. Photos by Hellen Sergeyeva/Shutterstock and Photodisc/Thinkstock.

1_123125_2267723_futuretense_logo_allabbrevoneline

The now-ubiquitous Heartbleed, the devastating Sony Pictures hack, the $1 billion Russian bank hack, the theft of sensitive government personnel files—one hole in a cybersecurity edifice can cause the whole thing to crash down. New reports of an Android text message vulnerability, so far unrevealed yet affecting almost a billion devices, underscore how every new computer technology seems to open up even more possibilities for hackers. Security fixes, from Chrome patches to Windows hotfixes, hold the walls in place. But what if you had a security hole you couldn’t patch?

David AuerbachDavid Auerbach

David Auerbach is a writer and software engineer based in New York. His website is http://davidauerba.ch.

Rowhammer.js, a new security attack revealed in a paper by security researchers Daniel Gruss, Clémentine Maurice, and Stefan Mangard, brings a truly new wrinkle to our understanding of computer vulnerabilities. “But I keep my system patched and up to date!” you might say. Rowhammer is here to tell you that’s not enough. Though the tech industry has known about the bug that Rowhammer exploits for several years, it was only this March that researchers at Google’s Project Zero revealed how it could be used by attackers.

Advertisement

Why is Rowhammer so scary? Because it doesn’t afflict your software but finds a weakness in your hardware, a physical problem with how current memory chips are constructed. So it doesn’t matter whether you’re using Linux, Windows, or iOS: If an Intel chip (or an AMD one, or possibly others) is inside, so is Rowhammer. Incredibly, Gruss, Maurice, and Mangard’s paper reveals how to exploit it from a simple webpage.

Chipmakers have known about Rowhammer since at least 2012. The problem affects Intel processors going back as far as 2009. Describing a remote Javascript attack using Rowhammer, Gruss, Maurice, and Mangard’s paper is a wake-up call. Previously, taking advantage of Rowhammer required local program execution on a computer—in other words, the computer already needed to be partly compromised. But now, any webpage can potentially exploit Rowhammer to arbitrarily access your data, perhaps even by gaining full control over the computer. And again, it doesn’t matter what operating system you’re using, since the problem is in the physical circuits of your memory chips. As the security researchers explain, it is “the first remote software-induced hardware-fault attack.”

The basis of many exploits, including Rowhammer, is a program getting access to places it shouldn’t. In the abstract, computers distinguish between programs (the code that runs) and data (the information that the code runs on), when in actuality a program is just a particular kind of data that a computer treats in a special way. Many exploits that take control of a computer, from buffer overruns to Microsoft Office hijacks, revolve around contriving a particular stream of data that worms through an accidental hole between where the data is supposed to be and where the program is. Part of the attacker’s “data” is the attacker’s own program, which then overwrites the user’s program to give the attacker control over the user’s computer that he shouldn’t have.

Here’s a classic example from xkcd:

150727_BIT_Rowhammer-XKCD

Cartoon by xkcd.com (https://xkcd.com/327/)

The gag is that Robert’s name actually contains a bit of executable database code. Because the school’s computers failed to treat Robert’s name merely as data but mistakenly took part of it (the “DROP TABLE Students;” part) as an actual program instruction, Robert’s name instructed the computer to delete the whole database. (Oops.)

Powered by Livefyre
  Slate Plus
Dear Prudence
July 29 2015 2:41 PM “If You’ve Got a Good Solution, I’m Going to Steal It for a Future Answer.” Dear Prudence and The Gist follow up with “Creeped Out,” a letter writer with an unfriendly co-worker.