Editing Surreptitious RAM

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
Bunnie Huang wrote about "surreptitious RAM" on p. 206 of his book ''Hacking the Xbox''.  Surreptitious RAM refers either to memory modules or memory module adapters that provide some interface other than the commands coming from the memory bus on the motherboard.  For example, we can imagine a memory module that has a standard DIMM form factor and interface but that also provides an external USB interface which lets another computer read (and maybe write) the current contents of RAM as a USB mass storage device.  The ability to access the contents of RAM over an external interface provide a convenient way to defeat any memory protection policies enforced by the operating system and MMU (even on systems where DMA can be disabled).  This is pretty powerful for forensics, debugging, or computer security attacks (given physical access to a PC); Bunnie and trusted computing developers have also described it as a practical way of attacking the implementation of TPMs in PCs.  Does anyone want to try to make some surreptitious RAM or a surreptitious RAM adapter? [[User:Schoen|Schoen]] 16:38, 30 January 2009 (PST)
Bunnie Huang wrote about "surreptitious RAM" on p. 206 of his book ''Hacking the Xbox''.  Surreptitious RAM refers either to memory modules or memory module adapters that provide some interface other than the commands coming from the memory bus on the motherboard.  For example, we can imagine a memory module that has a standard DIMM form factor and interface but that also provides an external USB interface which lets another computer read (and maybe write) the current contents of RAM as a USB mass storage device.  The ability to access the contents of RAM over an external interface provide a convenient way to defeat any memory protection policies enforced by the operating system and MMU (even on systems where DMA can be disabled).  This is pretty powerful for forensics, debugging, or computer security attacks (given physical access to a PC); Bunnie and trusted computing developers have also described it as a practical way of attacking the implementation of TPMs in PCs.  Does anyone want to try to make some surreptitious RAM or a surreptitious RAM adapter? [[User:Schoen|Schoen]] 16:38, 30 January 2009 (PST)


=== Relevant literature ===
[http://books.google.com/books?id=FdPNE6beKcMC&pg=PA204&lpg=PA204&dq=surreptitious+RAM&source=web&ots=vwmKMThkKQ&sig=Vz5yf2Qhre3n8kuE-flaL25v-Ig&hl=en&sa=X&oi=book_result&resnum=2&ct=result Google books reference ]
[http://books.google.com/books?id=FdPNE6beKcMC&pg=PA204&lpg=PA204&dq=surreptitious+RAM&source=web&ots=vwmKMThkKQ&sig=Vz5yf2Qhre3n8kuE-flaL25v-Ig&hl=en&sa=X&oi=book_result&resnum=2&ct=result Google books reference ]
=== Pre-built Hardware interfaces ===
[http://www.busboards.com/products/memory/ddrii/ddrii400dc/ ddrii400dc]
Please note that all contributions to Noisebridge are considered to be released under the Creative Commons Attribution-NonCommercial-ShareAlike (see Noisebridge:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)