Hacker News new | past | comments | ask | show | jobs | submit login

ECC isn't effective mitigation against Rowhammer either.

https://www.vusec.net/projects/eccploit/

tl;dr ECC logic can't cope with 'single' errors involving > 2 bits.






It has to cause a huge amount of single-bit errors to find a spot suitable for a three-bit error.

If these errors are actually treated as errors, then chips will be disabled or processes will get blacklisted long before they can be used to exploit.

So this is really "ECC is often configured wrong", not "ECC isn't effective".




Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: