+

Derya et al., 2025 - Google Patents

Fault+ probe: A generic rowhammer-based bit recovery attack

Derya et al., 2025

View PDF
Document ID
978596173674806188
Author
Derya K
Tol M
Sunar B
Publication year
Publication venue
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security

External Links

Snippet

Rowhammer is a security vulnerability that allows unauthorized attackers to induce errors within DRAM cells, eg, to attain elevated user privileges or to extract sensitive information from cryptographic schemes. To prevent fault injections from escalating to successful …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Lou et al. A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
Fei et al. Security vulnerabilities of SGX and countermeasures: A survey
Juffinger et al. CSI: Rowhammer–Cryptographic security and integrity against rowhammer
Moghimi et al. {TPM-FAIL}:{TPM} meets timing and lattice attacks
Kwong et al. Rambleed: Reading bits in memory without accessing them
Evtyushkin et al. Branchscope: A new side-channel attack on directional branch predictor
Mus et al. Jolt: Recovering tls signing keys via rowhammer faults
Jang et al. SGX-Bomb: Locking down the processor via Rowhammer attack
Schwarz et al. Malware guard extension: Using SGX to conceal cache attacks
Inci et al. Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
He et al. How secure is your cache against side-channel attacks?
Kayaalp et al. A high-resolution side-channel attack on last-level cache
Islam et al. Signature correction attack on dilithium signature scheme
Zhang et al. Trusense: Information leakage from trustzone
Schwarz et al. Malware Guard Extension: abusing Intel SGX to conceal cache attacks
EP3188067B1 (en) Security control method and network device
Zankl et al. Side-channel attacks in the internet of things: threats and challenges
Kim et al. iLeakage: browser-based timerless speculative execution attacks on apple devices
Chakraborty et al. Explframe: Exploiting page frame cache for fault analysis of block ciphers
Adiletta et al. Mayhem: Targeted corruption of register and stack variables
Adiletta et al. Leapfrog: The rowhammer instruction skip attack
Derya et al. Fault+ probe: A generic rowhammer-based bit recovery attack
Bai et al. HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management
Montasari et al. Hardware-based cyber threats: attack vectors and defence techniques
CN112269996A (en) Dynamic measurement method of block chain main node-oriented active immune trusted computing platform
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载