With software becoming harder to compromise due to modern defenses, attackers are increasingly looking at exploiting hardware vulnerabilities such as Rowhammer. In response, the research community has developed several software defenses to protect existing hardware against this threat. In this paper, we show that the assumptions existing software defenses make about memory addressing are inaccurate. Specifically, we show that physical address space is often not contiguously mapped to DRAM address space, allowing attackers to trigger Rowhammer corruptions despite active software defenses. We develop RAMSES, a software library modeling end-to-end memory addressing, relying on public documentation, where available, and reverse-engineered model...
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what w...
Row hammer in dynamic random access memories (DRAM) is an effect by which repeatedly activating a ro...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
In recent years, the ability to induce bit-flips in DRAM cells via software-only driven charge deple...
A fundamental assumption in software security is that memory contents do not change unless there is ...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Rowhammer is a hardware vulnerability that can be exploited to induce bit flips in dynamic random ac...
Run-time attacks pose a continuous threat to the security of computer systems. These attacks aim at...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks ...
A fundamental assumption in software security is that a memory location can only be modified by proc...
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what w...
Row hammer in dynamic random access memories (DRAM) is an effect by which repeatedly activating a ro...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
In recent years, the ability to induce bit-flips in DRAM cells via software-only driven charge deple...
A fundamental assumption in software security is that memory contents do not change unless there is ...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Rowhammer is a hardware vulnerability that can be exploited to induce bit flips in dynamic random ac...
Run-time attacks pose a continuous threat to the security of computer systems. These attacks aim at...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks ...
A fundamental assumption in software security is that a memory location can only be modified by proc...
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what w...
Row hammer in dynamic random access memories (DRAM) is an effect by which repeatedly activating a ro...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...