skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition
Research Identifies New Vulnerability in Rowhammer Exploits

Research Identifies New Vulnerability in Rowhammer Exploits

/ 4 min read

Quick take - Recent research has identified a new type of vulnerability called LeapFrog gadgets in Rowhammer exploits, which allows attackers to bypass critical code segments, posing significant risks to data integrity and control flow in computing processes, while also highlighting the need for improved detection methods and countermeasures against these evolving threats.

Fast Facts

  • Recent research has identified a new vulnerability called LeapFrog gadgets, enhancing the sophistication of Rowhammer exploits that threaten data and control flow integrity.
  • LeapFrog gadgets allow attackers to bypass critical code segments, such as authentication and encryption, by manipulating the Program Counter (PC) stored in the stack.
  • A systematic methodology for detecting these gadgets has been developed, enabling automated identification of vulnerable targets and optimal attack parameters.
  • Experimental demonstrations successfully executed attacks on a decision tree algorithm and the OpenSSL library, revealing plaintext and disrupting TLS handshake processes.
  • The study calls for dedicated Rowhammer-resistant hardware and improved compiler tools to address the evolving threats posed by these vulnerabilities, particularly in light of issues with existing countermeasures.

Evolution of Rowhammer Exploits: LeapFrog Gadgets

Recent research has unveiled a significant evolution in the sophistication of Rowhammer exploits, with the introduction of a new type of vulnerability known as LeapFrog gadgets. Rowhammer attacks are known to target data integrity and control flow integrity within computing processes, posing serious risks to security-critical code.

Understanding LeapFrog Gadgets

Identifying vulnerable targets, referred to as Rowhammer gadgets, and understanding the potential outcomes of fault attempts remains a complex challenge for attackers. LeapFrog gadgets enable adversaries to bypass essential code segments, including authentication checks and encryption routines. This occurs when the Program Counter (PC) value is stored in either the user or kernel stack, allowing attackers to manipulate execution flow.

The research outlines a systematic methodology for detecting these gadgets, which facilitates automated identification of susceptible targets and optimal attack parameters. In experimental demonstrations, the attack was successfully executed on a decision tree algorithm and the OpenSSL cryptographic library, revealing plaintext by bypassing encryption. A practical test was also conducted in a client/server TLS handshake scenario, where the attack induced an instruction skip in a client application.

Implications and Countermeasures

Tools utilized in this research scanned the Open Quantum Safe library to quantify the presence of LeapFrog gadgets, further underscoring the extent of the vulnerability across various software. The study highlights that advancements in DRAM technology have heightened susceptibility to bit flips, leading to increased reliability issues. The Rowhammer effect can be exacerbated by rapid access to adjacent memory rows, enabling bit flips to occur before scheduled refresh intervals.

Previous studies have explored various methods of exploiting Rowhammer vulnerabilities, such as remote attacks via JavaScript and network-based attacks, emphasizing the potential threats to both data integrity and confidentiality. Countermeasures proposed in the research include increasing DRAM refresh rates, adding no-operation (nop) instructions to code, and implementing redundancy in control flow. However, the effectiveness of existing countermeasures, such as the Target Row Refresh (TRR) hardware solution, has been called into question.

Future Directions

The findings illustrate that instruction-skipping attacks can disrupt the normal execution flow of programs, often requiring precision that can be difficult to achieve without physical access. The paper introduces a custom tool called the Multidimensional Fault Simulator (MFS), developed for the dynamic detection of LeapFrog gadgets. This tool improves upon previous methodologies by systematically analyzing binaries to locate the PC in the stack, while also addressing the challenges posed by Address Space Layout Randomization (ASLR).

The research concludes with a call for the development of dedicated Rowhammer-resistant hardware or Rowhammer-aware compiler tools to mitigate the risks associated with LeapFrog attacks. It emphasizes the need for robust defenses against these evolving threats, particularly as vulnerabilities in post-quantum cryptography schemes have also been identified, highlighting the urgent need for enhanced security measures in the face of increasingly sophisticated exploitation techniques.

Original Source: Read the Full Article Here

Check out what's latest