MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighboring rows of target data. In DRAM, however, the physical addresses of neighboring rows are not always contiguous even if they are located before or after a target row. Hence, it is important to know the mapping algorithm which maps between physical addresses and physical row indexes not only for an attack but also for protection. In this thesis, we introduce a method to reverse engineer the exact mapping algorithm and demonstrate that the assumption in previous rowhammer work is faulty. In addition, we introduce a novel and efficient rowhammer method and improve existing mitigations that have a security hole caused by the faulty assumption. F...
Rowhammer is a hardware vulnerability that can be exploited to induce bit flips in dynamic random ac...
The RowHammer vulnerability in DRAM is a critical threat to system security. To protect against RowH...
Increasingly sophisticated Rowhammer exploits allow an attacker that can execute code on a vulnerabl...
In recent years, the ability to induce bit-flips in DRAM cells via software-only driven charge deple...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
Row hammer in dynamic random access memories (DRAM) is an effect by which repeatedly activating a ro...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Modern systems mitigate Rowhammer using victim refresh, which refreshes the two neighbours of an agg...
A fundamental assumption in software security is that memory contents do not change unless there is ...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what w...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks ...
Rowhammer is a hardware vulnerability that can be exploited to induce bit flips in dynamic random ac...
The RowHammer vulnerability in DRAM is a critical threat to system security. To protect against RowH...
Increasingly sophisticated Rowhammer exploits allow an attacker that can execute code on a vulnerabl...
In recent years, the ability to induce bit-flips in DRAM cells via software-only driven charge deple...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
Row hammer in dynamic random access memories (DRAM) is an effect by which repeatedly activating a ro...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Modern systems mitigate Rowhammer using victim refresh, which refreshes the two neighbours of an agg...
A fundamental assumption in software security is that memory contents do not change unless there is ...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what w...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks ...
Rowhammer is a hardware vulnerability that can be exploited to induce bit flips in dynamic random ac...
The RowHammer vulnerability in DRAM is a critical threat to system security. To protect against RowH...
Increasingly sophisticated Rowhammer exploits allow an attacker that can execute code on a vulnerabl...