Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Title | Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries |
Publication Type | Journal Article |
Year of Publication | 2019 |
Authors | Xu, Lai, Yu, Rongwei, Wang, Lina, Liu, Weijie |
Journal | Tsinghua Science and Technology |
Volume | 24 |
Pagination | 535—545 |
Date Published | October 2019 |
ISSN | 1007-0214 |
Keywords | advanced Memway algorithm, application program interfaces, binary relocation step, cache storage, Computer bugs, disk, DRAM chips, Dynamic Random Access Memory cells, exploitable physical addresses, Hardware, Heuristic algorithms, I-O Systems, i-o systems security, in-memory swapping, in-memory waylaying acceleration, input-output programs, Kernel, Linux, Linux page cache, Linux tmpfs, mainstream platforms, Memway+fadvise relocation scheme, microarchitectural security threat, page cache eviction, parallel processing, powerful privilege-escalation attacks, program diagnostics, proof-of-concept Waylaying algorithm, pubcrawl, Random access memory, rowhammer attacks, Rowhammer bug, running time, Scalability, security, security of data, system memory, system monitoring, time 15.0 min to 200.0 min, unprivileged instructions, unprivileged posix fadvise API, victim binary, Waylaying algorithm, Waylaying method |
Abstract | The Rowhammer bug is a novel micro-architectural security threat, enabling powerful privilege-escalation attacks on various mainstream platforms. It works by actively flipping bits in Dynamic Random Access Memory (DRAM) cells with unprivileged instructions. In order to set up Rowhammer against binaries in the Linux page cache, the Waylaying algorithm has previously been proposed. The Waylaying method stealthily relocates binaries onto exploitable physical addresses without exhausting system memory. However, the proof-of-concept Waylaying algorithm can be easily detected during page cache eviction because of its high disk I/O overhead and long running time. This paper proposes the more advanced Memway algorithm, which improves on Waylaying in terms of both I/O overhead and speed. Running time and disk I/O overhead are reduced by 90% by utilizing Linux tmpfs and inmemory swapping to manage eviction files. Furthermore, by combining Memway with the unprivileged posix fadvise API, the binary relocation step is made 100 times faster. Equipped with our Memway+fadvise relocation scheme, we demonstrate practical Rowhammer attacks that take only 15-200 minutes to covertly relocate a victim binary, and less than 3 seconds to flip the target instruction bit. |
URL | https://ieeexplore.ieee.org/document/8698210 |
DOI | 10.26599/TST.2018.9010134 |
Citation Key | xu_memway_2019 |
- Scalability
- page cache eviction
- parallel processing
- powerful privilege-escalation attacks
- program diagnostics
- proof-of-concept Waylaying algorithm
- pubcrawl
- Random access memory
- rowhammer attacks
- Rowhammer bug
- running time
- microarchitectural security threat
- security
- security of data
- system memory
- system monitoring
- time 15.0 min to 200.0 min
- unprivileged instructions
- unprivileged posix fadvise API
- victim binary
- Waylaying algorithm
- Waylaying method
- I-O Systems
- application program interfaces
- binary relocation step
- cache storage
- Computer bugs
- disk
- DRAM chips
- Dynamic Random Access Memory cells
- exploitable physical addresses
- Hardware
- Heuristic algorithms
- advanced Memway algorithm
- i-o systems security
- in-memory swapping
- in-memory waylaying acceleration
- input-output programs
- Kernel
- Linux
- Linux page cache
- Linux tmpfs
- mainstream platforms
- Memway+fadvise relocation scheme