Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

ECC.fail - Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory

USENIX via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a groundbreaking cybersecurity research presentation that demonstrates the first successful Rowhammer attack against Intel servers equipped with DDR4 ECC memory. Learn how researchers from Georgia Tech, University of Michigan, Purdue University, and Ruhr University Bochum overcame significant technical challenges to exploit this hardware vulnerability in enterprise server environments. Discover the methodology behind characterizing Hynix's Target Row Refresh (TRR) implementation on server components and understand how effective hammering patterns were developed using both FPGA and Intel-based testing platforms. Examine the reverse engineering process of Intel's ECC implementation on Skylake and Cascade Lake servers, revealing a coding distance of four that enables incorrect ECC correction with minimal bit flips. Follow the development of an end-to-end attack technique that successfully flips memory bits on Intel servers without causing system crashes. Witness a practical demonstration where the attack compromises RSA public keys in memory, forcing servers to accept messages not signed by the original cryptographic key. Gain insights into advanced memory exploitation techniques, server security vulnerabilities, and the limitations of traditional ECC protection mechanisms in enterprise computing environments.

Syllabus

USENIX Security '25 - ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory

Taught by

USENIX

Reviews

Start your review of ECC.fail - Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.