Dottorato di Ricerca in Information and Comunications Technology Ciclo XXXIAdvancements in exploitation techniques call for the need of advanced defenses. Modern operating systems have to face new sophisticate attacks that do not rely on any programming mistake, rather they exploit leaking information from computational side effects (side-channel attacks) or hardware glitches (rowhammer attacks). Mitigating these new attacks poses new challanges and involves delicate trade-offs, balancing security on one side and performance, simplicity, and compatibility on the other. In this disseration we explore the attack surface exposed by page fusion, a memory saving optimization in modern operating systems and, after that, a secure page fusio...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
Historically, a computing resource is scarce and expensive. In the last few decades, considerable ef...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
To reduce memory pressure, modern operating systems and hypervisors such as Linux/KVM deploy page-le...
Over the last two years, the Rowhammer bug transformed from a hard-to-exploit DRAM disturbance error...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
The discrepancy between the abstract model used to reason about the security of computer systems and...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
As the cell density of DRAM modules keeps increasing to guarantee the growing demand for memory capa...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
Historically, a computing resource is scarce and expensive. In the last few decades, considerable ef...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
To reduce memory pressure, modern operating systems and hypervisors such as Linux/KVM deploy page-le...
Over the last two years, the Rowhammer bug transformed from a hard-to-exploit DRAM disturbance error...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
The discrepancy between the abstract model used to reason about the security of computer systems and...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
As the cell density of DRAM modules keeps increasing to guarantee the growing demand for memory capa...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
Historically, a computing resource is scarce and expensive. In the last few decades, considerable ef...