SMASH: Synchronized Many-Sided Rowhammer Attacks from Javascript
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Microkernel Mechanisms for Improving the Trustworthiness of Commodity Hardware
Microkernel Mechanisms for Improving the Trustworthiness of Commodity Hardware Yanyan Shen Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy School of Computer Science and Engineering Faculty of Engineering March 2019 Thesis/Dissertation Sheet Surname/Family Name : Shen Given Name/s : Yanyan Abbreviation for degree as give in the University calendar : PhD Faculty : Faculty of Engineering School : School of Computer Science and Engineering Microkernel Mechanisms for Improving the Trustworthiness of Commodity Thesis Title : Hardware Abstract 350 words maximum: (PLEASE TYPE) The thesis presents microkernel-based software-implemented mechanisms for improving the trustworthiness of computer systems based on commercial off-the-shelf (COTS) hardware that can malfunction when the hardware is impacted by transient hardware faults. The hardware anomalies, if undetected, can cause data corruptions, system crashes, and security vulnerabilities, significantly undermining system dependability. Specifically, we adopt the single event upset (SEU) fault model and address transient CPU or memory faults. We take advantage of the functional correctness and isolation guarantee provided by the formally verified seL4 microkernel and hardware redundancy provided by multicore processors, design the redundant co-execution (RCoE) architecture that replicates a whole software system (including the microkernel) onto different CPU cores, and implement two variants, loosely-coupled redundant co-execution (LC-RCoE) and closely-coupled redundant co-execution (CC-RCoE), for the ARM and x86 architectures. RCoE treats each replica of the software system as a state machine and ensures that the replicas start from the same initial state, observe consistent inputs, perform equivalent state transitions, and thus produce consistent outputs during error-free executions. -
Jeremy Jordan
Jeremy Jordan Jeremy Jordan was born and raised in Corpus Christi, Texas. He was always a singer, but at the age of 17, he accidentally fell in love with acting when cast as The Mute in the musical, The Fantasticks. After high school, Jeremy went on to study drama at Ithaca College and moved to New York City after graduating in 2007. After about a year of catering and waiting tables, he began to book some regional theatre work, and in early 2009, landed his first Broadway show, Rock of Ages. He was a swing, understudying several roles including the lead. In December of 2009, he left Rock of Ages to play Tony in Broadway's West Side Story. After West Side Story, Jeremy traveled to Sarasota, Florida to play Clyde Barrow opposite Laura Osnes in Bonnie & Clyde. He then headed to Atlanta, Georgia to shoot his first feature film, “Joyful Noise,” opposite Dolly Parton and Queen Latifah. Todd Graff, who wrote and directed the film, decided to cast him in the movie after coincidentally attending Jeremy's very first performance as the lead in Rock of Ages. In the fall of 2011, Jeremy fulfilled a childhood dream when he was cast as Jack Kelly in Disney's world premiere production of Newsies at Paper Mill Playhouse in New Jersey. He played Jack at night, and during the day rehearsed Bonnie & Clyde, which was coming to Broadway shortly after Newsies finished its regional run. Bonnie & Clyde opened on Broadway in November, 2011 but sadly would close after only 69 performances. -
Nbc Smash & the Voice
NBC SMASH & THE VOICE Problem: How does a network drive viewership in a highly competitive time slot? Solution: Use digital OOH formats to blanket the market on the air date to keep the shows top of mind. BACKGROUND NBC wanted to ensure high viewer rates for the second season of The Voice and the debut of its new show Smash. OBJECTIVE The planning agency was tasked with creating an out of home campaign to publicize the second season of The Voice, and the premiere of newcomer Smash, which would both debut on the Monday following Super Bowl Sunday. STRATEGY To ensure NBC dominated the Monday after the Super Bowl, the planning agency blanketed the full day Monday February 6, with Smash and The Voice tune- in messaging across out of home, supplementing the print, broadcast, radio, and digital efforts from agency partners. The planning agency, working with the client and digital specialists, identified 300+ digital OOH screens across 12 markets to supplement the existing efforts across print, broadcast, radio, and digital. The result was NBC’s “Day of Digital,” a national campaign that gave the network share of voice domination across all me- dia. On Monday, February 6, digital OOH advertisements for Smash and The Voice went live across the selected markets. PLAN DETAILS Markets: Los Angeles, New York, Chicago, Philadelphia, Atlanta, Boston, Minneapolis, Sacramento, Detroit, Phoenix, Dallas, Seattle Flighting Dates: January - February 2012 Out of Home Formats: New York and Los Angeles were the markets of primary focus and where the traditional OOH mostly ran: taxi tops, station dominations, wrapped double- decker buses, and a Times Square Spectacular in New York, while engaging a media mix of bus shelters, bulletins, and wrapped double-decker buses in Los Angeles. -
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms Victor van der Veen Yanick Fratantonio Martina Lindorfer Vrije Universiteit Amsterdam UC Santa Barbara UC Santa Barbara [email protected] [email protected] [email protected] Daniel Gruss Clémentine Maurice Giovanni Vigna Graz University of Technology Graz University of Technology UC Santa Barbara [email protected] [email protected] [email protected] Herbert Bos Kaveh Razavi Cristiano Giuffrida Vrije Universiteit Amsterdam Vrije Universiteit Amsterdam Vrije Universiteit Amsterdam [email protected] [email protected] [email protected] ABSTRACT 1. INTRODUCTION Recent work shows that the Rowhammer hardware bug can The Rowhammer hardware bug allows an attacker to mod- be used to craft powerful attacks and completely subvert a ify memory without accessing it, simply by repeatedly ac- system. However, existing efforts either describe probabilis- cessing, i.e., \hammering", a given physical memory loca- tic (and thus unreliable) attacks or rely on special (and often tion until a bit in an adjacent location flips. Rowhammer unavailable) memory management features to place victim has been used to craft powerful attacks that bypass all cur- objects in vulnerable physical memory locations. Moreover, rent defenses and completely subvert a system [16,32,35,47]. prior work only targets x86 and researchers have openly won- Until now, the proposed exploitation techniques are either dered whether Rowhammer attacks on other architectures, probabilistic [16,35] or rely on special memory management such as ARM, are even possible. features such as memory deduplication [32], MMU paravir- We show that deterministic Rowhammer attacks are feasi- tualization [47], or the pagemap interface [35]. -
Throwhammer: Rowhammer Attacks Over the Network and Defenses
Throwhammer: Rowhammer Attacks over the Network and Defenses Andrei Tatar Radhesh Krishnan Konoth Elias Athanasopoulos VU Amsterdam VU Amsterdam University of Cyprus Cristiano Giuffrida Herbert Bos Kaveh Razavi VU Amsterdam VU Amsterdam VU Amsterdam Abstract never progressed beyond local privilege escalations or sandbox escapes. The attacker needs the ability to run Increasingly sophisticated Rowhammer exploits allow an code on the victim machine in order to flip bits in sen- attacker that can execute code on a vulnerable system sitive data. Hence, Rowhammer posed little threat from to escalate privileges and compromise browsers, clouds, attackers without code execution on the victim machines. and mobile systems. In all these attacks, the common In this paper, we show that this is no longer true and at- assumption is that attackers first need to obtain code tackers can flip bits by only sending network packets to execution on the victim machine to be able to exploit a victim machine connected to RDMA-enabled networks Rowhammer either by having (unprivileged) code exe- commonly used in clouds and data centers [1, 20, 45, 62]. cution on the victim machine or by luring the victim to a website that employs a malicious JavaScript applica- Rowhammer exploits today Rowhammer allows at- tion. In this paper, we revisit this assumption and show tackers to flip a bit in one physical memory location that an attacker can trigger and exploit Rowhammer bit by aggressively reading (or writing) other locations (i.e., flips directly from a remote machine by only sending hammering). As bit flips occur at the physical level, they network packets. -
SUNY Guidebook Fall 2021
Table of Contents Overview 2 GAMES OFFERED 2 Overwatch 2 Guilty Gear: Strive 2 Rocket League 2 Splitgate 2 Call of Duty: Black Ops Cold War 3 Super Smash Bros. Ultimate 3 Call of Duty: Warzone Squads 3 VALORANT 3 SEASON OVERVIEW FALL ‘21 4 LeagueSpot Registration 4 Regular Season 4 Playoffs 4 Thanksgiving Break 4 Season Ends 4 QUICK REFERENCE 5 Helpful Links 5 Need Help With Hardware and IT? 5 Knowledge Base 6 REGISTRATION FLOW 6 STUDENTS 7 Player Registration 7 Navigating the Website (Students) 9 ADMINISTRATION 12 Registering Your School 12 Inviting Students to Your Organization 13 Navigating the Website (Administration) 15 Enrolling Your Team in the Upcoming Season 18 GAME DAY PROCEDURES 20 1 Overview GAMES OFFERED Overwatch Platform: PC Format: 6v6 A team-based first-person shooter, where players choose from a roster of heroes to assemble a team Guilty Gear: Strive Platform: PC Format: 1v1 Fast-paced fighting game that combines 2D and 3D artwork with a colorful cast of characters. Rocket League Platform: Crossplay Format: 3v3 A physics based soccer game where players pilot a car with a rocket engine to hit the ball around Splitgate Platform: PC Format: 4v4 Sci-fi shooter that combines the strategic elements of portals with the explosive gameplay of FPS. 2 Call of Duty: Black Ops Cold War Platform: Crossplay Format: 4v4 First-person shooter in which teams work together to take down enemy teams in a series of game modes. Super Smash Bros. Ultimate Platform: Nintendo Switch Format: Singles A fighting game in which the objective is to knock the opponent off the stage and eliminate all of their stocks Call of Duty: Warzone Squads Platform: Crossplay Format: 4v4 First-person battle royale shooter in which squads work together to win in a free-for-all battle. -
Can Microkernels Mitigate Microarchitectural Attacks?⋆
Can Microkernels Mitigate Microarchitectural Attacks?? Gunnar Grimsdal1, Patrik Lundgren2, Christian Vestlund3, Felipe Boeira1, and Mikael Asplund1[0000−0003−1916−3398] 1 Department of Computer and Information Science, Link¨oping University, Sweden ffelipe.boeira,[email protected] 2 Westermo Network Technologies [email protected] 3 Sectra AB, Link¨oping,Sweden Abstract. Microarchitectural attacks such as Meltdown and Spectre have attracted much attention recently. In this paper we study how effec- tive these attacks are on the Genode microkernel framework using three different kernels, Okl4, Nova, and Linux. We try to answer the question whether the strict process separation provided by Genode combined with security-oriented kernels such as Okl4 and Nova can mitigate microar- chitectural attacks. We evaluate the attack effectiveness by measuring the throughput of data transfer that violates the security properties of the system. Our results show that the underlying side-channel attack Flush+Reload used in both Meltdown and Spectre, is effective on all in- vestigated platforms. We were also able to achieve high throughput using the Spectre attack, but we were not able to show any effective Meltdown attack on Okl4 or Nova. Keywords: Genode, Meltdown, Spectre, Flush+Reload, Okl4, Nova 1 Introduction It used to be the case that general-purpose operating systems were mostly found in desktop computers and servers. However, as IoT devices are becoming in- creasingly more sophisticated, they tend more and more to require a powerful operating system such as Linux, since otherwise all basic services must be im- plemented and maintained by the device developers. At the same time, security has become a prime concern both in IoT and in the cloud domain. -
Film Stars Don't Die in Liverpool
FILM STARS DON'T DIE IN LIVERPOOL Written by Matt Greenhalgh 1. 1 INT. LEADING LADY’S DRESSING ROOM - NIGHT 1 Snug and serene. An illuminated vanity mirror takes centre stage emanating a welcoming glamorous glow. A SERIES OF C/UP’s: A TDK AUDIO TAPE inserted into a slim SONY CASSETTE PLAYER immediately placing us in the late 70’s/early 80’s. A CHIPPED VARNISHED FINGER NAIL presses play.. ‘Song For Guy’ by Elton John (Gloria’s favourite track) drifts in... OUR LEADING LADY sits in the dresser. Find her through shards of focus and reflections as she transforms.. warming her vocal chords as she goes: GLORIA (O.C.) ‘La Poo Boo Moo..’ Eye-line pencil; cherry-red lipstick; ‘Saks of Fifth Avenue’ COMPACT MIRROR, intricately engraved with “Love Bogie ’In A Lonely Place’ 1950”; Elnett hair laquer; Chanel perfume. A larger BROKEN HAND-MIRROR. A GOLDEN LOVE HEART PENDANT (opens with a sychronised tune). All Gloria’s ‘tools’ procured from a TATTY GREEN WASH-BAG, a trusted witness to her ‘process’ probably a thousand times or more. GLORIA (O.C.) (CONT’D) ‘Major Mickey’s Malt Makes Me Merry.’ Costume: Peek at pale flesh and slim limbs as she climbs into a black, pleated wrap around dress with a plunging neckline; black stockings and princess slippers.. the dress hangs loose, too loose.. the belt tightened as far as it can go. A KNOCK ON THE DOOR STAGE MANANGER (V.O.) Five minutes Miss Grahame. GLORIA (O.C.) Thanks honey. Gloria’s tongue CLUCKS the roof of her mouth in approval, it’s one of her things. -
Throwhammer: Rowhammer Attacks Over the Network and Defenses
Throwhammer: Rowhammer Attacks over the Network and Defenses Andrei Tatar and Radhesh Krishnan Konoth, Vrije Universiteit Amsterdam; Elias Athanasopoulos, University of Cyprus; Cristiano Giuffrida, Herbert Bos, and Kaveh Razavi, Vrije Universiteit Amsterdam https://www.usenix.org/conference/atc18/presentation/tatar This paper is included in the Proceedings of the 2018 USENIX Annual Technical Conference (USENIX ATC ’18). July 11–13, 2018 • Boston, MA, USA ISBN 978-1-939133-02-1 Open access to the Proceedings of the 2018 USENIX Annual Technical Conference is sponsored by USENIX. Throwhammer: Rowhammer Attacks over the Network and Defenses Andrei Tatar Radhesh Krishnan Konoth Elias Athanasopoulos VU Amsterdam VU Amsterdam University of Cyprus Cristiano Giuffrida Herbert Bos Kaveh Razavi VU Amsterdam VU Amsterdam VU Amsterdam Abstract never progressed beyond local privilege escalations or sandbox escapes. The attacker needs the ability to run Increasingly sophisticated Rowhammer exploits allow an code on the victim machine in order to flip bits in sen- attacker that can execute code on a vulnerable system sitive data. Hence, Rowhammer posed little threat from to escalate privileges and compromise browsers, clouds, attackers without code execution on the victim machines. and mobile systems. In all these attacks, the common In this paper, we show that this is no longer true and at- assumption is that attackers first need to obtain code tackers can flip bits by only sending network packets to execution on the victim machine to be able to exploit a victim machine connected to RDMA-enabled networks Rowhammer either by having (unprivileged) code exe- commonly used in clouds and data centers [1, 20, 45, 62]. -
Row Hammer Exploit in Cloud Environment
Iowa State University Capstones, Theses and Creative Components Dissertations Fall 2018 Row hammer exploit in cloud environment Adithya Venkataraman Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/creativecomponents Part of the Computer and Systems Architecture Commons Recommended Citation Venkataraman, Adithya, "Row hammer exploit in cloud environment" (2018). Creative Components. 113. https://lib.dr.iastate.edu/creativecomponents/113 This Creative Component is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Creative Components by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Row hammer exploit in c loud environment by Adithya Venkataraman A report submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Major: Electrical and Computer Engineering Program of Study Committee: Akhilesh Tyagi, Major Professor The student author, whose presentation of the scholarship herein was approved by the program of study committee, is solely responsible for the content of this thesis. The Graduate College will ensure this dissertation is globally accessible and will not permit alterations after a degree is conferred. Iowa State University Ames, Iowa 2018 Copyright © Adithya Venkataraman, 2018. All rights reserved. ii TABLE OF CONTENTS Page -
Openajax Hub 1.1 and Smash (Secure Mashups) 2 Reshaping of Enterprise: Emerging “Self Service” Business Pattern
OpenAjax Hub 1.1 & SMash (Secure Mashups) Jon Ferraiolo and Sumeer Bhola IBM March 19, 2008 Agenda . Mash Up Recap . Introducing OpenAjax Alliance . OpenAjax Hub1.0 . OpenAjax Hub 1.1 (and SMash) OpenAjax Hub 1.1 and SMash (Secure Mashups) 2 Reshaping of Enterprise: emerging “self service” business pattern Web 2.0 Content Ecosystem • enterprise mash-ups - enabling “web apps” creation by LOBs & subject matter experts • ease of access to the data that can be combined in different ways to meet ad hoc business opportunities • designing for re-mixability • combine data for diverse information services • transforming into portable, re-mixable assets & services • discover-ability of content both internet & intranet • exploiting emergent business opportunities NEO Airport Mashup Airport Location/Status Data Operator Queries Yahoo Map (Colored Icons) Weather Data (Overlay) Airport Airport Detail Data Alert/Warning Runway Data (NOTAM) Data 4 NEO Airport Mashup Airport Location/Status Data Operator Queries Yahoo Map (Colored Icons) Weather Data (Overlay) Airport Airport Detail Data Alert/Warning Runway Data (NOTAM) Data 4 Quick history of Ajax . Late 1990’s to 2001 . DHTML (dynamic HTML) . IE5 adds XMLHttpRequest . Microsoft suspends development of IE . 2000-2005 . Other browsers implement each others’ features and quirks, including XMLHttpRequest . 2003-2005 . Pioneering Web developers make use of Ajax techniques . Feb 2005: Jesse James Garrett dubs the term “AJAX” OpenAjax Hub 1.1 and SMash (Secure Mashups) 3 Emergence of Ajax toolkits . In beginning, Google (and others) showed the way . Google Suggest, GMail, Google Maps . Initial industry skepticism . OK, fine for Google, but too difficult for everyone else . But almost immediately, Ajax toolkits emerged . -
Story Mode Character Checklist Smash Ultimate
Story Mode Character Checklist Smash Ultimate Sniffier Otho journalising her summa so anaerobiotically that Willy flouts very blooming. Ingrate and baddish Waiter mythicizing: which Wakefield is warrigal enough? Sometimes undrained Silvio advises her bivouacking wham, but stabilized Goddard pikes chastely or maculate inescapably. Now reopen the area of the smash mode character guides and additional effects on Nintendo is thus taking steps to improve its game. Into the World the Light beam mode Super Smash Bros but no Special Thanks. Smash ultimate smash bros as story modes in the flavor text message of light and snake is recommended that had ever. How to character unlock ike? Gold if smash? Top 10 Best Super Smash Bros Characters of shower Time Lineups. To truly complete the story there you'll need to defeat not software but two. In smash mode as story modes in super smash bros mixes the metroids with gears and even the. Nintendo, Richter, the family sky clears and the rubbish is acquired. Super Smash Bros Ultimate Spirit Characters List that you. Oooh my sweet Daisy! The top spot is probably the smash character! There are mild many other IPs that could run more fighters or carpet time fighters. Fight game modes in smash mode character. Within the wood List bunny'll find character movesets strengths and weaknesses. Ultimate it wasn't kidding about the cemetery every third character suddenly has ever appeared in any previous Smash Bros game already available does the. Slide under her in smash bros ultimate wiki guide will want to play a super smash bros ultimate you too similar to know it is in.