Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage

Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin

33rd USENIX Security Symposium · Day 1 · USENIX Security '24

The "Go Go Gadget Hammer" talk at USENIX Security '24 introduces a novel and concerning approach to exploiting **Rowhammer** vulnerabilities, moving beyond the traditional targets of page table entries (PTEs) and sudo binaries. Presented by Youssef Tobah and his collaborators, this research demonstrates how a single bit flip in memory can be leveraged to achieve arbitrary read or write access by targeting general code patterns, termed "Rowhammer Gadgets." This work significantly broadens the attack surface for Rowhammer, posing a substantial threat to system security.

AI review

This research unveils a critical paradigm shift in Rowhammer exploitation by introducing "Rowhammer Gadgets" – general nested pointer dereference patterns in code. It demonstrates a novel method to achieve arbitrary kernel read/write, rendering current specific-target mitigations obsolete and demanding a systemic re-evaluation of Rowhammer defenses. This is a must-see for anyone serious about memory security.

Watch on YouTube