Thunderhammer: Rowhammer Bitflips via PCIe and Thunderbolt (USB-C)
By: Robert Dumitru , Junpeng Wan , Daniel Genkin and more
Potential Business Impact:
Lets bad devices change computer memory.
In recent years, Rowhammer has attracted significant attention from academia and industry alike. This technique, first published in 2014, flips bits in memory by repeatedly accessing neighbouring memory locations. Since its discovery, researchers have developed a substantial body of work exploiting Rowhammer and proposing countermeasures. These works demonstrate that Rowhammer can be mounted not only through native code, but also via remote code execution, such as JavaScript in browsers, and over networks. In this work, we uncover a previously unexplored Rowhammer vector. We present Thunderhammer, an attack that induces DRAM bitflips from malicious peripherals connected via PCIe or Thunderbolt (which tunnels PCIe). On modern DDR4 systems, we observe that triggering bitflips through PCIe requests requires precisely timed access patterns tailored to the target system. We design a custom device to reverse engineer critical architectural parameters that shape PCIe request scheduling, and to execute effective hammering access patterns. Leveraging this knowledge, we successfully demonstrate Rowhammer-induced bitflips in DDR4 memory modules via both PCIe slot connections and Thunderbolt ports tunnelling PCIe.
Similar Papers
Thunderhammer: Rowhammer Bitflips via PCIe and Thunderbolt (USB-C)
Cryptography and Security
Lets hackers break computers through USB.
$Ο$Hammer: Reviving RowHammer Attacks on New Architectures via Prefetching
Cryptography and Security
Lets hackers break computer memory again.
Rubber Mallet: A Study of High Frequency Localized Bit Flips and Their Impact on Security
Cryptography and Security
Breaks computer security by flipping memory bits.