"It's always DNS", right? I've been troubleshooting a "failing" hard disk for weeks now. Occasional disk errors in dmesg, and the odd system crash followed by a fsck with tons of errors. Nope, not a failing hard disk. Bad RAM. I swear, RAM is worse than DNS for me.

#homelab #selfhosting #badram

Use GRUB's BADRAM to drop 2/3 of the bad stick
0%
Buy a responsible amount of RAM
0%
Give in.. it'll eventually be a server, max it out
100%
Poll ended at .
COSIC researcher Jesse De Meulemeester presented "#BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments" at IEEE SSP in San Francisco.
https://sp2025.ieee-security.org/program.html
🔗Badram website: https://badram.eu/
IEEE Symposium on Security and Privacy 2025

Today Jesse De Meulemeester will present "BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments" at IEEE SSP in San Francisco.
https://sp2025.ieee-security.org/program.html
#badram #ieeessp
BadRAM - Breaching Processor Security via Rogue Memory Modules: info and demo on https://badram.eu/
IEEE Symposium on Security and Privacy 2025

Security Week 2451: атака BadRAM на процессоры AMD

На прошлой неделе исследователи из университетов Бельгии, Германии и Великобритании продемонстрировали необычную аппаратную атаку, эксплуатирующую уязвимость в процессорах AMD. Хотя это и сложная атака, при некоторых условиях она может представлять интерес, так как позволяет обойти новейшие средства защиты данных при использовании виртуализации. Практическая реализация атаки предполагает модификацию так называемого чипа SPD на модуле оперативной памяти, в котором прописаны параметры этого модуля. Таким образом атакующие могут сообщить процессору, что объем планки памяти в два раза больше, чем на самом деле, например, 32 гигабайта вместо 16. Таким образом можно перенаправить поток данных от «защищенной» виртуальной ОС в руки потенциального злоумышленника.

https://habr.com/ru/companies/kaspersky/articles/866860/

#badram

Security Week 2451: атака BadRAM на процессоры AMD

На прошлой неделе исследователи из университетов Бельгии, Германии и Великобритании продемонстрировали необычную аппаратную атаку, эксплуатирующую уязвимость в процессорах AMD. Хотя это и сложная...

Хабр
BadRAM: Historischer Seitenkanal hebelt RAM-Verschlüsselung aus

Server schützen Daten mit komplexen Funktionen für Confidential Computing, die sich durch Speicherriegel mit gefälschter Konfiguration austricksen lassen.

heise online

AMD's Secure Encrypted Virtualization (SEV) technology faces a serious threat! 🛡️ Researchers have revealed a $10 attack that can bypass its defenses, potentially compromising cloud security. This "BadRAM" technique manipulates memory to expose sensitive data. 😱💻 Major cloud providers like AWS and Google Cloud could be affected. Stay informed! #CyberSecurity #AMD #CloudComputing #BadRAM #newz

https://www.theregister.com/2024/12/10/amd_secure_vm_tech_undone/

AMD secure VM tech undone by DRAM meddling

Boffins devise BadRAM attack to pilfer secrets from SEV-SNP encrypted memory

The Register

🚨 Security Alert! Researchers uncover critical vulnerability in AMD's Secure Encrypted Virtualization (SEV) tech 🖥️ Hackers can potentially exploit memory aliasing to infiltrate devices using a technique called #BadRAM 🕵️ AMD issued CVE-2024-21944 advisory - update your systems! 🛡️ #CyberSecurity #TechNews #newz

https://www.techradar.com/pro/security/amd-vm-security-tools-can-be-bypassed-letting-hackers-infilitrate-your-devices-experts-warn

AMD VM security tools can be bypassed, letting hackers infilitrate your devices, experts warn

AMD suggests utilizing memory modules that lock SPD

TechRadar pro

New #BadRAM attack neuters #security assurances in #AMD #Epyc processors

One of the oldest maxims in hacking is that once an attacker has physical access to a device, it’s game over for its security. The basis is sound.
#AMDEpyc

https://arstechnica.com/information-technology/2024/12/new-badram-attack-neuters-security-assurances-in-amd-epyc-processors/

AMD’s trusted execution environment blown wide open by new BadRAM attack

Attack bypasses AMD protection promising security, even when a server is compromised.

Ars Technica
International research team uncovers vulnerability in cloud server security
#badram #cosic #kuleuven
https://nieuws.kuleuven.be/en/content/2024/vulnerability-in-cloud-server-security-badram
International research team uncovers vulnerability in cloud server security

Researchers from KU Leuven, the University of Birmingham, and the University of Lübeck have successfully bypassed advanced security technologies in AMD processors. Their technique exploits a vulnerability in the communication between the CPU and memory.

Nieuws
#BadRAM: Tampering with DRAM modules allows attackers to bypass SEV-SNP's write protection and forging attestation reports, breaking all trust in
#SEV-SNP
https://badram.eu/
Research by COSIC KU Leuven, the University of Lübeck, and the University of Birmingham
BadRAM

BadRAM