Google researchers hack computers using DRAM electrical leaks

The 'Rowhammering' attack exploits electrical interference to change binary values in memory

Google researchers have written the first-ever attack code that takes advantage of electrical interference between densely packed memory cells, a unique style of attack that could require changes in chip design.

The work builds on a paper published last year by Carnegie Mellon University and Intel, which found it was possible to change binary values in stored memory by repeatedly accessing nearby memory cells, a process called "bit flipping."

DRAM memory is vulnerable to such electrical interference because the cells are so closely packed together, a result of engineers increasing a chip's memory capacity.

Chipmakers have known about electrical interference, but may have viewed it as a reliability issue rather than a security problem, wrote Mark Seaborn, a Google software engineer. Google's work shows bit flipping can have a much larger impact.

They tested 29 x86-based laptops manufactured between 2010 and last year and found some vulnerable. All of the laptops, which were not identified by make and model, used DDR3 DRAM.

A lack of technical information makes it hard to figure out more broadly which computers would be most vulnerable, Seaborn wrote.

"We don't know for sure how many machines are vulnerable to this attack, or how many existing vulnerable machines are fixable," he wrote.

Using a technique nicknamed rowhammering, Google's two exploits repeatedly accessed a row of memory cells, causing binary values in nearby ones to change from a 0 to 1 or the reverse.

Rowhammering allowed the first exploit to complete a privilege escalation attack and escape a sandbox Google has in Chrome that is supposed to limit what an application running in the browser can do. Once out of the sandbox, the code could directly access the operating system, Seaborn wrote.

The second exploit uses rowhammer-induced bit flips to gain kernel-level privileges. The bit flips were introduced in page-table entries, which map virtual memory to physical memory. The code then had read-write access to all of the computer's physical memory, Seaborn wrote.

There are some mitigations for bit flipping in the latest DDR4 DRAM chips, which have succeeded DDR3 in many laptops and servers. But those mitigations may have been put in place just for reliability reasons, he wrote.

"History has shown that issues that are thought to be 'only' reliability issues often have significant security implications, and the rowhammer problem is a good example of this," he wrote. "Many layers of software security rest on the assumption the contents of memory locations don't change unless the locations are written to."

Send news tips and comments to Follow me on Twitter: @jeremy_kirk

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags Googlesecurity

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Most Popular Reviews

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?