Latest News

Every Android device is susceptible to a hardware vulnerability called RAMpage
Saturday, June 30, 2018 IST
Every Android device is susceptible to a hardware vulnerability called RAMpage

We have consistently seen various vectors of attack rear their head when it comes to Android smartphones. We’ve seen Shattered Trust, Cloak and Dagger, and Rowhammer, just to name a few. RAMpage is the latest one on the block, and while it is a hardware vulnerability, it doesn’t necessarily need physical access to your device to exploit. How it works is relatively simple.

 
 

When a CPU reads or writes a row of bits in the RAM module present on the device, the neighboring rows are slightly affected due to a tiny electric discharge. This isn’t usually a problem as we know RAM does this and that’s why it’s periodically refreshed to make sure nothing goes wrong. But what if we start “hammering” the same “row”? What if we continuously read or write to the same row in order to disrupt neighboring rows? This can cause a bit-flip in a memory row that we shouldn’t own or have access to at all. That’s what Rowhammer is, and it’s being used as part of a larger vulnerability called RAMpage. The CVE is CVE-2018-9442 and it affects devices shipped with LPDDR2, LPDDR3, or LPDDR4 RAM. We’ve already covered Rowhammer in greater depth here.
 
The Team Behind RAMpage
 
Vrije Universiteit Amsterdam
 
TU Wien
 
EURECOM
 
*Harikrishnan Padmanabha Pillai, MSc.
IBM
 
*Prof. Dr. Giovanni Vigna
UC Santa Barbara
 
UC Santa Barbara
 
*Prof. Dr. Herbert Bos
Vrije Universiteit Amsterdam
 
Vrije Universiteit Amsterdam
 
What is RAMpage?
 
RAMpage isn’t exactly new, so to say. RAMpage is a hardware vulnerability which implements Rowhammer and other, smaller exploits. RAMpage can be used to gain root access on a device, but the researchers managed to get it to do a whole lot more as well. It could be used to bypass JavaScript sandboxes and even perform an attack running on another virtual machine on the same computer on x86 devices. ARM-based devices are also vulnerable, and that’s where our Android phones come in. DRAMMER stands for “Deterministic Rowhammer Attacks on Mobile Devices,” and it was able to be used against a number of Android phones in the past to gain root access.

 
 

How does RAMpage work?
 
RAMpage works primarily by abusing Android’s memory management system – the Android ION memory allocator. ION was introduced with Android 4.0 back at the end of 2011 and simply gives applications the memory they require to run. However, breaking this down means that you can access all memory on the device from within any application – an extremely dangerous situation. What was once protected memory no longer is once ION is broken down, and any malicious applications looking for data leakage could sift through this memory. While it’s hard to protect against DRAMMER (and, incidentally, Rowhammer) because it’s a hardware vulnerability, building safeguards around Android ION will mitigate most of the damage that can be done. The researchers call it GuardION and have released it open-source on GitHub.
 
What is GuardION?
 
GuardION is the proposed mitigation method put forward by those who discovered RAMpage. It simply sets up buffer rows around potentially exploitable software in RAM, such as Android ION. It’s a simple method, but it’s better for a few reasons. The first being that you obviously can’t replace the RAM module in every Android device released. The second is that, even in newer devices, hardware fixes will be harder on the battery as they will constantly have to refresh the memory. Hence protecting memory with software is easier. The researchers showed that GuardION has negligible memory overhead, better performance than Google’s attempts at preventing the exploit and prevents all known DMA (Direct Memory Access) attacks. However, while the researchers are in contact with Google, the company has determined that GuardION presents too large of a performance overhead for it to be incorporated into AOSP. GuardION doesn’t fix the hardware vulnerability, instead, it simply accounts for it and reduces the amount of damage it can do.
 
Am I vulnerable to RAMpage?
 
While chances are if you own an Android phone released since 2012 you are vulnerable, you can still install the DRAMMER test application from their official website below to see for yourself. While all of this seems scary, there is no public exploit available yet. While you should still be careful out there, there is currently no reason to worry as the exploit is not in the public domain. The researchers do not intend to release it at this point in time either. You can check out the original research paper below.

 
 
 
 
 

Related Topics

 
 
 

Trending News & Articles

 Article
Tata Harrier’s 7-seater Version H7X Will Be Quite Different – Report

Tata Harrier’s three-row seat version in works, details out  

Recently posted . 2K views . 0 min read
 

 Article
How to make you car as silent as a Rolls Royce inside

Rolls Royce cars are extremely luxurious. While there are many expensive pieces of equipment in Rolls Royce cars, their most relaxing feature is the silence that ...

Recently posted . 2K views . 2 min read
 

 Article
India's Top 5 Mobile Charger manufacturer Brand 2019

The following list of India's Top 5 Mobile Charger manufacture Brand 2019  

Recently posted . 2K views . 0 min read
 

 Article
Mahindra XUV300 vs Maruti Brezza, Ford EcoSport, Tata Nexon – Price

XUV300 is the latest entrant in the compact SUV segment.

Recently posted . 2K views . 0 min read
 

 
 

More in Electronics & Gadgets

 Article
Microsoft Offers Patent Troll Defence for Cloud Customers

Microsoft Corp has the idea up another manner to attractability clients to its cloud computing carrier: deterrent towards patent trolls. Busines...

Recently posted. 847 views . 11 min read
 

 Article
Ford Develops 'Buzz Car' That Detects Driver's Emotions And Displays It On The Car (Video)

While driving, the driver usually experiences a range of emotions. At times fear, at times, anger, at times happiness or maybe excitement, to name a few. And now, A...

Recently posted. 814 views . 4 min read
 

 Article
WhatsApp Adds New Privacy Tools, Including Online Activity Controls and the Ability to Silently Leave Group Chats

Amid ongoing concerns about how it can be used to organize criminal activity, due to its default encryption process, WhatsApp has announced some additional privacy ...

Recently posted. 1K views . 1 min read
 

 Article
Essential's Audio Adapter HD headphone jack accessory is finally available

Essential's much promised Audio Adapter HD for its smartphone is finally available to buy right now, both in the US and Canada.  

Recently posted. 744 views . 1 min read
 

 Article
Lenovo P2 launched :Price, specifications and availability

Chinese tech giant Lenovo started 2017 on a high in India by launching the powerful P2 smartphone that comes with a huge 5100mAh non-removable battery....

Recently posted. 611 views . 10 min read
 

 
 
 

   Prashnavali

  Thought of the Day

अक्सर लोग कहते हैं की पैसा सम्भाल कर रखो बुरे वक्त पर काम आयेगा *पर अक्सर लोग*i यह भूल जाते है कि "रिश्ते सम्भाल कर रखे तो, बुरा वक्त यूं ही गुजर जायेगा...!" 🌹💔N💔🌹 शुभप्रभात
Anonymous

Be the first one to comment on this story

Close
Post Comment
Shibu Chandran
2 hours ago

Serving political interests in another person's illness is the lowest form of human value. A 70+ y old lady has cancer.

November 28, 2016 05:00 IST
Shibu Chandran
2 hours ago

Serving political interests in another person's illness is the lowest form of human value. A 70+ y old lady has cancer.

November 28, 2016 05:00 IST
Shibu Chandran
2 hours ago

Serving political interests in another person's illness is the lowest form of human value. A 70+ y old lady has cancer.

November 28, 2016 05:00 IST
Shibu Chandran
2 hours ago

Serving political interests in another person's illness is the lowest form of human value. A 70+ y old lady has cancer.

November 28, 2016 05:00 IST


ads
Back To Top