#badram

CosicBeCosicBe
2025-05-15

COSIC researcher Jesse De Meulemeester presented ": Practical Memory Aliasing Attacks on Trusted Execution Environments" at IEEE SSP in San Francisco.
sp2025.ieee-security.org/progr
🔗Badram website: badram.eu/

CosicBeCosicBe
2025-05-14

Today Jesse De Meulemeester will present "BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments" at IEEE SSP in San Francisco.
sp2025.ieee-security.org/progr

BadRAM - Breaching Processor Security via Rogue Memory Modules: info and demo on badram.eu/

2024-12-16

Security Week 2451: атака BadRAM на процессоры AMD

На прошлой неделе исследователи из университетов Бельгии, Германии и Великобритании продемонстрировали необычную аппаратную атаку, эксплуатирующую уязвимость в процессорах AMD. Хотя это и сложная атака, при некоторых условиях она может представлять интерес, так как позволяет обойти новейшие средства защиты данных при использовании виртуализации. Практическая реализация атаки предполагает модификацию так называемого чипа SPD на модуле оперативной памяти, в котором прописаны параметры этого модуля. Таким образом атакующие могут сообщить процессору, что объем планки памяти в два раза больше, чем на самом деле, например, 32 гигабайта вместо 16. Таким образом можно перенаправить поток данных от «защищенной» виртуальной ОС в руки потенциального злоумышленника.

habr.com/ru/companies/kaspersk

#badram

Marcel SIneM(S)USsimsus@social.tchncs.de
2024-12-12
nemo™ 🇺🇦nemo@mas.to
2024-12-12

AMD's Secure Encrypted Virtualization (SEV) technology faces a serious threat! 🛡️ Researchers have revealed a $10 attack that can bypass its defenses, potentially compromising cloud security. This "BadRAM" technique manipulates memory to expose sensitive data. 😱💻 Major cloud providers like AWS and Google Cloud could be affected. Stay informed! #CyberSecurity #AMD #CloudComputing #BadRAM #newz

theregister.com/2024/12/10/amd

nemo™ 🇺🇦nemo@mas.to
2024-12-12

🚨 Security Alert! Researchers uncover critical vulnerability in AMD's Secure Encrypted Virtualization (SEV) tech 🖥️ Hackers can potentially exploit memory aliasing to infiltrate devices using a technique called #BadRAM 🕵️ AMD issued CVE-2024-21944 advisory - update your systems! 🛡️ #CyberSecurity #TechNews #newz

techradar.com/pro/security/amd

2024-12-11

New #BadRAM attack neuters #security assurances in #AMD #Epyc processors

One of the oldest maxims in hacking is that once an attacker has physical access to a device, it’s game over for its security. The basis is sound.
#AMDEpyc

arstechnica.com/information-te

CosicBeCosicBe
2024-12-11

International research team uncovers vulnerability in cloud server security

nieuws.kuleuven.be/en/content/

CosicBeCosicBe
2024-12-11

: Tampering with DRAM modules allows attackers to bypass SEV-SNP's write protection and forging attestation reports, breaking all trust in
-SNP
badram.eu/
Research by COSIC KU Leuven, the University of Lübeck, and the University of Birmingham

2024-12-10

#BadRAM / #CVE_2024_21944 #vulnerability seems quite far fetched to me. If your trust model includes #AMDSEV you hopefully also have assurances of physical security.
arstechnica.com/information-te

Alexandre Cheron :verified:axcheron@infosec.exchange
2024-12-10

Any idea what could be causing this?

It's very random, sometimes it doesn't happen for weeks, sometimes it happens every few days.

I only use this machine for web browsing.

32 gb of Ram
Linux Mint 22 Cinnamon

I reckon it's a ram issue but could it be the graphics card?

#pcproblems #badram #Linux

2024-03-05

Bugs really, REALLY <3 me: youtube.com/watch?v=0YcSt5148y Halt & Catch Fire. 64-bit #GRUB2 crashes if one specifies a #memtest86+ supplied #badram address! :-/

2018-03-29

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst