Over the last two years, the Rowhammer bug transformed from a hard-to-exploit DRAM disturbance error into a fully weaponized attack vector. Researchers demonstrated exploits not only against desktop computers, but also used single bit flips to compromise the cloud and mobile devices, all without relying on any software vulnerability. Since hardware-level mitigations cannot be backported, a search for software defenses is pressing. Proposals made by both academia and industry, however, are either impractical to deploy, or insufficient in stopping all attacks: we present rampage, a set of DMA-based Rowhammer attacks against the latest Android OS, consisting of (1) a root exploit, and (2) a series of app-to-app exploit scenarios that bypass al...
In the recent years, the amount of data transmitting between devices become sufficiently large. Thus...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
As the cell density of DRAM modules keeps increasing to guarantee the growing demand for memory capa...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
Increasingly sophisticated Rowhammer exploits allow an attacker that can execute code on a vulnerabl...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
A fundamental assumption in software security is that memory contents do not change unless there is ...
Dottorato di Ricerca in Information and Comunications Technology Ciclo XXXIAdvancements in exploitat...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
In the recent years, the amount of data transmitting between devices become sufficiently large. Thus...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
As the cell density of DRAM modules keeps increasing to guarantee the growing demand for memory capa...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
Increasingly sophisticated Rowhammer exploits allow an attacker that can execute code on a vulnerabl...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the fut...
A fundamental assumption in software security is that memory contents do not change unless there is ...
Dottorato di Ricerca in Information and Comunications Technology Ciclo XXXIAdvancements in exploitat...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
In the recent years, the amount of data transmitting between devices become sufficiently large. Thus...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...