Santosh Rajashekar, CISA, CISM, CDPSE, CISSP, CCSK’s Post

View profile for Santosh Rajashekar, CISA, CISM, CDPSE, CISSP, CCSK, graphic

Seasoned Cybersecurity Leader | 20+ Years in SOC & Threat Management | Extensive Global and Industry-Wide Experience Driving Security Excellence

BadRAM is a novel attack that creates aliases in the physical address space of DRAM modules. By manipulating the Serial Presence Detect (SPD) chip on a memory module, an attacker can trick the system into thinking the DRAM is larger than it actually is. Serial Presence Detect (SPD) is a critical feature in RAM modules that stores essential information about the memory’s specifications in an EEPROM chip, typically ranging from 128 to 1024 bytes. The SPD contains key parameters such as manufacturer data, memory capacity, speed ratings, and timing parameters, allowing the system’s BIOS to configure the memory for optimal performance automatically. https://lnkd.in/dKChyECf

BadRAM: A Low-Cost Attack on Trusted Execution Environments - Eclypsium | Supply Chain Security for the Modern Enterprise

BadRAM: A Low-Cost Attack on Trusted Execution Environments - Eclypsium | Supply Chain Security for the Modern Enterprise

eclypsium.com

To view or add a comment, sign in

Explore topics