Forwarded from Deleted Account
[niconiconi] @realPeterCxy: 需要重新给主板 BIOS 的 EEPROM 芯片外部编程
Forwarded from Deleted Account
[niconiconi] @misaka4e21: 不是。写保护是 EEPROM 芯片的功能。
Forwarded from Deleted Account
[niconiconi] @misaka4e21: 其实用软件方法也是可以暂时解除 EEPROM 的写保护的
Forwarded from Deleted Account
[niconiconi] @misaka4e21: 但需要大量逆向工程,所以不如直接物理解决。
Forwarded from Deleted Account
niconiconi: 换句话说nadebula终于有希望能用上去me的工作站跑gaussian了?
Forwarded from Deleted Account
[niconiconi] 另外前一阵子发现 coreboot 虽然硬编码了 Intel 内存控制器的 random seed 不能防御 Cold Boot
Forwarded from Deleted Account
[niconiconi] 但是 coreboot 有 row hammering 的防御(!)
Forwarded from Deleted Account
[niconiconi] Since the release of Ivy Bridge, Intel Xeon processors support the so-called pseudo target row refresh (pTRR) that can be used in combination with pTRR-compliant DDR3 dual in-line memory modules (DIMMs).
Forwarded from Deleted Account
[niconiconi] @Icenowy: 内存发生比特翻转,如果运气不好是会破坏重要数据的……
Forwarded from Deleted Account
[ttlbot] ⇪标题: GitHub - google/rowhammer-test: Test DRAM for bit flips caused by the rowhammer problem
Forwarded from Deleted Account
[niconiconi] @Icenowy: It works on x86 only (either x86-32 or x86-64), because it relies on x86's CLFLUSH instruction for flushing cache lines.
Forwarded from Deleted Account
[niconiconi] @Icenowy: 但这个漏洞本身不是 x86 限定的,有一个 JavaScript 写的 PoC 用了启发式算法在多种架构上触发 bit flip.