International audienceModern computer memories have been shown to have reliability issues. The main memory is the target of a security attack called Rowhammer, which causes bit flips in adjacent victim cells of aggressor rows. Multiple mitigation techniques have been proposed to counter this issue, but they all come at a non-negligible cost of performance and/or silicon surface. Some techniques rely on a detection mechanism using row access counters to trigger automatic defenses. In this paper, we propose a tool to build a system-specific detection mechanism using gem5 to simulate the system and Machine Learning to detect the attack by analyzing hardware event traces. The detection mechanism built with our tool shows high accuracy (over 99....
Rowhammer is a hardware vulnerability that can be exploited to induce bit flips in dynamic random ac...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
International audienceModern computer memories have been shown to have reliability issues. The main ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
International audienceThe increasing complexity of modern microprocessors created new attack areas. ...
International audienceWe are seeing an increase in cybersecurity attacks on resource-constrained sys...
A fundamental assumption in software security is that memory contents do not change unless there is ...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
As the cell density of DRAM modules keeps increasing to guarantee the growing demand for memory capa...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
Rowhammer is a hardware vulnerability that can be exploited to induce bit flips in dynamic random ac...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
International audienceModern computer memories have been shown to have reliability issues. The main ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
International audienceThe increasing complexity of modern microprocessors created new attack areas. ...
International audienceWe are seeing an increase in cybersecurity attacks on resource-constrained sys...
A fundamental assumption in software security is that memory contents do not change unless there is ...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
As the cell density of DRAM modules keeps increasing to guarantee the growing demand for memory capa...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
Rowhammer is a hardware vulnerability that can be exploited to induce bit flips in dynamic random ac...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...