Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks in cryptographic protocols. While most PUFs require dedicated circuitry, recent research leverages DRAM hardware for PUFs due to its intrinsic properties and wide deployment. Recently, a new memory-based PUF was proposed that utilizes the infamous Rowhammer effect in DRAM. In this paper, we show two remote attacks on DRAM-based PUFs. First, a DoS attack that exploits the Rowhammer effect to manipulate PUF responses. Second, a modeling attack that predicts PUF responses by observing few challenge-response pairs. Our results indicate that DRAM may not be suitable for PUFs
Row hammer in dynamic random access memories (DRAM) is an effect by which repeatedly activating a ro...
Recent developments have increased the demand for adequate security solutions, based on primitives t...
Abstract. We present a side-channel attack based on remanence de-cay in volatile memory and show how...
Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random A...
Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random A...
Rowhammer is a hardware vulnerability that can be exploited to induce bit flips in dynamic random ac...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
We present a side-channel attack based on remanence decay in volatile memory and show how it can be ...
In recent years, the ability to induce bit-flips in DRAM cells via software-only driven charge deple...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
We present a side-channel attack based on remanence decay in volatile memory and show how it can be ...
Row hammer in dynamic random access memories (DRAM) is an effect by which repeatedly activating a ro...
Recent developments have increased the demand for adequate security solutions, based on primitives t...
Abstract. We present a side-channel attack based on remanence de-cay in volatile memory and show how...
Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random A...
Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random A...
Rowhammer is a hardware vulnerability that can be exploited to induce bit flips in dynamic random ac...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
We present a side-channel attack based on remanence decay in volatile memory and show how it can be ...
In recent years, the ability to induce bit-flips in DRAM cells via software-only driven charge deple...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
Physical Unclonable Functions (PUFs) are considered to be a promising technology that provides a har...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
We present a side-channel attack based on remanence decay in volatile memory and show how it can be ...
Row hammer in dynamic random access memories (DRAM) is an effect by which repeatedly activating a ro...
Recent developments have increased the demand for adequate security solutions, based on primitives t...
Abstract. We present a side-channel attack based on remanence de-cay in volatile memory and show how...