Kitz ADSL Broadband Information
adsl spacer  
Support this site
Home Broadband ISPs Tech Routers Wiki Forum
 
     
   Compare ISP   Rate your ISP
   Glossary   Glossary
 
Please login or register.

Login with username, password and session length
Advanced search  

News:

Author Topic: Rowhammer exploit on Andriod phones  (Read 4511 times)

parkdale

  • Reg Member
  • ***
  • Posts: 597
Rowhammer exploit on Andriod phones
« on: October 26, 2016, 06:35:11 PM »

Ok so this is going to take some fixing  :-X
http://arstechnica.com/security/2016/10/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing/

but you can protect your home PC's by adjusting the refresh rate of your ram in the Bios
http://www.wilderssecurity.com/threads/exploiting-the-dram-rowhammer-bug-to-gain-kernel-privileges.374127/

Mobile phones are going to be difficult because they are all factory set with no way to adjust them :no:
Logged
Vodafone FTTC ECI cab 40/10Mb connection / Fritz!box7590

ejs

  • Kitizen
  • ****
  • Posts: 2078
Re: Rowhammer exploit on Andriod phones
« Reply #1 on: October 26, 2016, 07:06:04 PM »

For computers, after running memtest, I thought it should be fairly obvious that you shouldn't be using memory settings (or bad RAM modules) that don't pass the tests.
Logged

parkdale

  • Reg Member
  • ***
  • Posts: 597
Re: Rowhammer exploit on Andriod phones
« Reply #2 on: October 26, 2016, 07:38:36 PM »

Reading further into this, DDR4 and above ram will be most affected, especially if over clocking on tight timings.
Slowing down refresh on fast memory will reduce the chances of the rowhammer effect.

Logged
Vodafone FTTC ECI cab 40/10Mb connection / Fritz!box7590