Juffinger et al., 2023 - Google Patents
CSI: Rowhammer–Cryptographic security and integrity against rowhammerJuffinger et al., 2023
View PDF- Document ID
- 14789299519079613596
- Author
- Juffinger J
- Lamster L
- Kogler A
- Eichlseder M
- Lipp M
- Gruss D
- Publication year
- Publication venue
- 2023 IEEE Symposium on Security and Privacy (SP)
External Links
Snippet
In this paper, we present CSI: Rowhammer, a principled hardware-software co-design Rowhammer mitigation with cryptographic security and integrity guarantees, that does not focus on any specific properties of Rowhammer. We design a new memory error detection …
- 238000012937 correction 0 abstract description 157
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1405—Saving, restoring, recovering or retrying at machine instruction level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0721—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment within a central processing unit [CPU]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Juffinger et al. | CSI: Rowhammer–Cryptographic security and integrity against rowhammer | |
| EP3758287B1 (en) | Deterministic encryption key rotation | |
| Kwong et al. | Rambleed: Reading bits in memory without accessing them | |
| Mutlu et al. | Rowhammer: A retrospective | |
| Kim et al. | Hardware-based always-on heap memory safety | |
| Parno et al. | Memoir: Practical state continuity for protected modules | |
| Islam et al. | Signature correction attack on dilithium signature scheme | |
| Duc et al. | Cryptopage: An efficient secure architecture with memory encryption, integrity and information leakage protection | |
| Mus et al. | Jolt: Recovering tls signing keys via rowhammer faults | |
| Saxena et al. | Pt-guard: Integrity-protected page tables to defend against breakthrough rowhammer attacks | |
| TW201209630A (en) | Systems and methods for detecting design-level attacks against a digital circuit | |
| Milenković et al. | Hardware support for code integrity in embedded processors | |
| Zankl et al. | Side-channel attacks in the internet of things: threats and challenges | |
| Kgil et al. | Chiplock: support for secure microarchitectures | |
| Chen et al. | Memguard: A low cost and energy efficient design to support and enhance memory system reliability | |
| Han et al. | Dolos: Improving the performance of persistent applications in adr-supported secure memory | |
| Ye et al. | Towards low-cost mechanisms to enable restoration of encrypted non-volatile memories | |
| Huang et al. | Ivec: off-chip memory integrity protection for both security and reliability | |
| Qiu et al. | PMU-Leaker: Performance monitor unit-based realization of cache side-channel attacks | |
| Adiletta et al. | Mayhem: Targeted corruption of register and stack variables | |
| Kanuparthi et al. | Architecture support for dynamic integrity checking | |
| Yitbarek et al. | Reducing the overhead of authenticated memory encryption using delta encoding and ECC memory | |
| Lamster et al. | Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through {MAGIC} | |
| Wang et al. | An M-cache-based security monitoring and fault recovery architecture for embedded processor | |
| Zubair et al. | RC-NVM: Recovery-aware reliability-security co-design for non-volatile memories |