A fundamental assumption in software security is that a memory location can only be modified by processes that may write to this memory location. However, a recent study has shown that parasitic effects in DRAM can change the content of a memory cell without accessing it, but by accessing other memory locations in a high frequency. This so-called Rowhammer bug occurs in most of today's memory modules and has fatal consequences for the security of all affected systems, e.g., privilege escalation attacks. All studies and attacks related to Rowhammer so far rely on the availability of a cache flush instruction in order to cause accesses to DRAM modules at a sufficiently high frequency. We overcome this limitation by defeating complex cache re...
This essay offers a close reading of a notable computer security vulnerability: the Rowhammer bug in...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
Increasingly sophisticated Rowhammer exploits allow an attacker that can execute code on a vulnerabl...
A fundamental assumption in software security is that memory contents do not change unless there is ...
Despite their in-DRAM Target Row Refresh (TRR) mitigations, some of the most recent DDR4 modules are...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
Page deduplication is a mechanism to reduce the memory footprint of a system. Identical physical pag...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Analysing security assumptions taken for the WebRTC and postMessage APIs led us to find a novel atta...
We present a micro-architectural side-channel attack that runs entirely in the browser. In contrast ...
Memory deduplication, a well-known technique to reduce the memory footprint across virtual machines,...
This essay offers a close reading of a notable computer security vulnerability: the Rowhammer bug in...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
Increasingly sophisticated Rowhammer exploits allow an attacker that can execute code on a vulnerabl...
A fundamental assumption in software security is that memory contents do not change unless there is ...
Despite their in-DRAM Target Row Refresh (TRR) mitigations, some of the most recent DDR4 modules are...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
Page deduplication is a mechanism to reduce the memory footprint of a system. Identical physical pag...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Analysing security assumptions taken for the WebRTC and postMessage APIs led us to find a novel atta...
We present a micro-architectural side-channel attack that runs entirely in the browser. In contrast ...
Memory deduplication, a well-known technique to reduce the memory footprint across virtual machines,...
This essay offers a close reading of a notable computer security vulnerability: the Rowhammer bug in...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...