


Research shows that AMD processors are also affected by the Rowhammer memory attack, and officials provide mitigation measures
News from this site on March 27, according to the latest research by researchers at the Swiss Federal Institute of Technology in Zurich, AMD’s Zen2 to Zen4 architecture processors will also be affected by the Rowhammer memory attack. AMD officials have provided responses and mitigation measures in this regard.
Note from this site: The Rowhammer attack takes advantage of the physical characteristics of modern DRAM memory. By repeatedly reading and writing the memory, it changes the charge state in adjacent memory cells and achieves bit flipping. An attacker can gain access to sensitive data or escalate privileges by inducing bit flips at specific locations.
Rowhammer attacks were previously common on Intel CPUs and Arm architecture processors. On the AMD side, this type of attack is difficult to implement due to the design differences of the memory system.
However, this time the researchers successfully built a Rowhammer attack variant named ZenHammer for AMD processors by reverse engineering AMD’s complex memory addressing functions.
The researchers conducted tests on the Ryzen 5 3600X CPU with Zen2 architecture and the Ryzen 5 5600G APU with Zen3 architecture. The results were ten attempts on these two systems using DDR4 DRAM memory. 7 and 6 successes respectively.
In addition, the researchers also conducted tests on the AMD Zen4 architecture platform using DDR5 memory. As a result, in ten attempts, only one set based on Ryzen 7 7700X processing success on the system.
This shows that the new platform is less susceptible to ZenHammer due to memory support for on-chip ECC, high memory refresh rates, and improved Rowhammer attack mitigation .
Regarding this latest research, AMD issued an announcement, recommending users to contact hardware manufacturers to determine whether they are sensitive to ZenHammer attacks, and gave the following mitigation suggestions:
Use support for ECC DRAM memory
Use a memory refresh rate higher than 1x
Disable memory burst/delayed refresh
For EPYC Xiaolong platforms using DDR4 memory, use the maximum support Activation count (MAC) memory controller;
For EPYC platforms using DDR5 memory, use a memory controller that supports Refresh Management.
The above is the detailed content of Research shows that AMD processors are also affected by the Rowhammer memory attack, and officials provide mitigation measures. For more information, please follow other related articles on the PHP Chinese website!

The Apple TV 4K (second- and third-generation) is capable of relaying audio from a compatible TV to a HomePod – even when you're not using your Apple TV. This allows you to stream audio from a TV-connected game console or other set-top box straight t

Only the best PSVR 2 games will give you the best experience on Sony's latest virtual reality headset. With a growing library full of different adventures, there's also never been a better time to dive in.While there may only be a few exclusives for

Remotely controlling the shutter on your iPhone's camera lets you include yourself in the photo while avoiding the limitations of a selfie. For example, it allows you to take a picture of a wider scene with you included in the frame, which is ideal f

If you can't wait until the release of Death Stranding 2: On the Beach, then the special Limited Edition DualSense Wireless Controller will be right up your street.Intended to celebrate the launch of the game, the Death Stranding 2: On the Beach Limi

iOS 18.5 is now available to download, and while it's not as feature rich as some of the prior iOS 18 updates that we've had, there are still some notable new additions and security features that are worth upgrading for.We've outlined all of the new

In iOS and iPadOS, Apple includes an option for users to specify the Bluetooth accessories they connect using pre-defined individual labels. Labeling your Bluetooth accessories helps to identify connected devices and improve audio notifications. Appl

The best PS4 games are still well worth playing, even if you're the owner of a PS5. Given that we can all still enjoy the best of the PS4 library on a PS5 too, the selection of experiences the console provides is still as accessible as ever. From gri

Apple is known for its privacy policies that keep user data collected to a minimum, but the company has also worked to incorporate many safety features into its devices. From summoning help when you can't to making sure you're not being tracked or fo


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Dreamweaver Mac version
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

WebStorm Mac version
Useful JavaScript development tools

Atom editor mac version download
The most popular open source editor

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
