Comments
...moreTotal Articles Found: 11
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2024-03-21 17:15:26
Popularity: 1630
Author: arstechnica.com via asymmetric
Keywords:
Comments
...morePublished: 2024-01-07 14:11:26
Popularity: 96
Author: andrewfromx@users.lobste.rs (andrewfromx)
Keywords:
Comments
...morePublished: 2022-07-19 12:38:57
Popularity: 68
Author: wizardishungry@users.lobste.rs (wizardishungry)
Keywords:
Comments
...morePublished: 2022-07-18 19:22:00
Popularity: 54
Author: rjzak@users.lobste.rs (rjzak)
Keywords:
Comments
...morePublished: 2022-01-18 12:06:54
Popularity: None
Author: freddyb@users.lobste.rs (freddyb)
Keywords:
Comments
...morePublished: 2021-06-03 17:07:50
Popularity: None
Author: kuijsten@users.lobste.rs (kuijsten)
Keywords:
Rowhammer attacks exploit electromagnetic interference among nearby DRAM cells to flip bits, corrupting data and altering system behavior. Unfortunately, DRAM vendors have opted for a blackbox approach to preventing these bit flips, exposing little information about in-DRAM mitigations. Despite vendor claims that their mitigations prevent Rowhammer, recent work bypasses these defenses to corrupt data. Further work shows that the Rowhammer problem is actually worsening in emerging DRAM and posits that system-level support is needed to produce adaptable and scalable defenses. Accordingly, we argue that the systems community can and must drive a fundamental change in Rowhammer mitigation techniques. In the short term, cloud providers and CPU vendors must work together to supplement limited in-DRAM mitigations—ill-equipped to handle rising susceptibility— with their own mitigations. We propose novel hardware primitives in the CPU’s integrated memory controller that would enable a variety of efficient software defenses, offering flexible safeguards against future attacks. In the long term, we assert that major consumers of DRAM must persuade DRAM vendors to provide precise information on their defenses, limitations, and necessary supplemental solutions. Comments
...morePublished: 2020-10-08 02:50:25
Popularity: 1398
Author: calvin@users.lobste.rs (calvin)
Keywords:
Comments
...morePublished: 2020-02-29 18:51:54
Popularity: 147
Author: calvin@users.lobste.rs (calvin)
Keywords:
Comments
...morePublished: 2020-03-03 12:43:15
Popularity: 194
Author: Bruce Schneier
Keywords:
There's a vulnerability in Wi-Fi hardware that breaks the encryption: The vulnerability exists in Wi-Fi chips made by Cypress Semiconductor and Broadcom, the latter a chipmaker Cypress acquired in 2016. The affected devices include iPhones, iPads, Macs, Amazon Echos and Kindles, Android devices, and Wi-Fi routers from Asus and Huawei, as well as the Raspberry Pi 3. Eset, the security...
...morePublished: 2019-05-23 16:52:31
Popularity: 147
Author: Bruce Schneier
Keywords:
Summary: Thangrycat is caused by a series of hardware design flaws within Cisco's Trust Anchor module. First commercially introduced in 2013, Cisco Trust Anchor module (TAm) is a proprietary hardware security module used in a wide range of Cisco products, including enterprise routers, switches and firewalls. TAm is the root of trust that underpins all other Cisco security and trustworthy...
...morePublished: 2019-03-14 18:20:34
Popularity: 248
Author: Bruce Schneier
Keywords:
This sounds like a good development: ...a new $10 million contract the Defense Department's Defense Advanced Research Projects Agency (DARPA) has launched to design and build a secure voting system that it hopes will be impervious to hacking. The first-of-its-kind system will be designed by an Oregon-based firm called Galois, a longtime government contractor with experience in designing secure and...
...more