Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Memory Deduplication: The Curse That Keeps on Giving (mette.org)
4 points by iliasku on Dec 30, 2016 | hide | past | favorite | 1 comment


tlds: they used the side-channel leakage together with rowhammer to flip bits in ssh public keys in memory from authorized_keys to convert them so they could factor them, generate a new private key and eventually log in. also, sources.list and the system gpg-keychain to point the system to a malicious repo and install a backdoored /bin/ls




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: