Derya et al., 2025 - Google Patents
Fault+ probe: A generic rowhammer-based bit recovery attackDerya et al., 2025
View PDF- Document ID
- 978596173674806188
- Author
- Derya K
- Tol M
- Sunar B
- Publication year
- Publication venue
- Proceedings of the 20th ACM Asia Conference on Computer and Communications Security
External Links
Snippet
Rowhammer is a security vulnerability that allows unauthorized attackers to induce errors within DRAM cells, eg, to attain elevated user privileges or to extract sensitive information from cryptographic schemes. To prevent fault injections from escalating to successful …
- 239000000523 sample 0 title abstract description 32
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lou et al. | A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography | |
| Fei et al. | Security vulnerabilities of SGX and countermeasures: A survey | |
| Juffinger et al. | CSI: Rowhammer–Cryptographic security and integrity against rowhammer | |
| Moghimi et al. | {TPM-FAIL}:{TPM} meets timing and lattice attacks | |
| Kwong et al. | Rambleed: Reading bits in memory without accessing them | |
| Evtyushkin et al. | Branchscope: A new side-channel attack on directional branch predictor | |
| Mus et al. | Jolt: Recovering tls signing keys via rowhammer faults | |
| Jang et al. | SGX-Bomb: Locking down the processor via Rowhammer attack | |
| Schwarz et al. | Malware guard extension: Using SGX to conceal cache attacks | |
| Inci et al. | Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud | |
| He et al. | How secure is your cache against side-channel attacks? | |
| Kayaalp et al. | A high-resolution side-channel attack on last-level cache | |
| Islam et al. | Signature correction attack on dilithium signature scheme | |
| Zhang et al. | Trusense: Information leakage from trustzone | |
| Schwarz et al. | Malware Guard Extension: abusing Intel SGX to conceal cache attacks | |
| EP3188067B1 (en) | Security control method and network device | |
| Zankl et al. | Side-channel attacks in the internet of things: threats and challenges | |
| Kim et al. | iLeakage: browser-based timerless speculative execution attacks on apple devices | |
| Chakraborty et al. | Explframe: Exploiting page frame cache for fault analysis of block ciphers | |
| Adiletta et al. | Mayhem: Targeted corruption of register and stack variables | |
| Adiletta et al. | Leapfrog: The rowhammer instruction skip attack | |
| Derya et al. | Fault+ probe: A generic rowhammer-based bit recovery attack | |
| Bai et al. | HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management | |
| Montasari et al. | Hardware-based cyber threats: attack vectors and defence techniques | |
| CN112269996A (en) | Dynamic measurement method of block chain main node-oriented active immune trusted computing platform |