New attack sheds light on virtual machine security flaws
A Princeton University student has shed light on security flaws in Java and .Net virtual machines using a lamp, some known properties of computer memory and a little luck.
An attack using his technique requires physical access to the computer, so the technique poses little threat to virtual machines running on PCs and servers. But it could be used to steal data from smart cards, said Sudhakar Govindavajhala, a computer-science graduate student at Princeton who demonstrated the procedure on Tuesday.
"There are smart cards that use Java that you could shine a light on, flip a bit and get access to the card's data," he said. Govindavajhala presented the paper at the Institute of Electrical and Electronic Engineers (IEEE) Symposium on Security and Privacy in Berkeley, California.
The technique relies on the ability of energy to "flip bits" in memory. While cosmic rays can very occasionally cause a random bit in memory to change value, from 0 to 1 or from 1 to 0, Govindavajhala decided not to wait. He used a lamp to heat up the chips inside a computer and cause one or more bits of memory to change.
[ Read more ]
- Article: Commentary on Microsoft .NET Passport Vulnerability BugTraq Disclosure (10 May 2003)
- News: Practical examples for establishing Web service security in .NET (7 May 2003)
- News: What's new in Windows Server 2003 (7 May 2003)
- News: .Net demystifies encryption (23 January 2003)
- News: Secure Programming with .NET (27 November 2002)
- News: Fault found in .Net security (3 May 2002)