Chaos Communication Congress
Chaos Communication Congress
Plundervolt: Flipping Bits from Software without Rowhammer (36x22)
Data di messa in onda: Dic 27, 2019
We present the next step after Rowhammer, a new software-based fault attack primitive: Plundervolt (CVE-2019-11157).
Many processors (including the widespread Intel Core series) expose privileged software interfaces to dynamically regulate processor frequency and operating voltage. We show that these privileged interfaces can be reliably exploited to undermine the system's security.
In multiple case studies, we show how the induced faults in enclave computations can be leveraged in real-world attacks to recover keys from cryptographic algorithms (including the AES-NI instruction set extension) or to induce memory safety vulnerabilities into bug-free enclave code.
- Iniziato: Dic 2011
- Episodi: 1118
- Followers: 0
- Terminata
- Sconosciuto
- Sconosciuto