Xiao et al., 2016 - Google Patents
One bit flips, one cloud flops:{Cross-VM} row hammer attacks and privilege escalationXiao et al., 2016
View PDF- Document ID
- 3265151246986587782
- Author
- Xiao Y
- Zhang X
- Zhang Y
- Teodorescu R
- Publication year
- Publication venue
- 25th USENIX security symposium (USENIX Security 16)
External Links
Snippet
Row hammer attacks exploit electrical interactions between neighboring memory cells in high-density dynamic random-access memory (DRAM) to induce memory errors. By rapidly and repeatedly accessing DRAMs with specific patterns, an adversary with limited privilege …
- 230000015654 memory 0 abstract description 192
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/10—Address translation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/0802—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
- G06F12/0893—Caches characterised by their organisation or structure
- G06F12/0895—Caches characterised by their organisation or structure of parts of caches, e.g. directory or tag array
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1491—Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Xiao et al. | One bit flips, one cloud flops:{Cross-VM} row hammer attacks and privilege escalation | |
| Tatar et al. | Throwhammer: Rowhammer attacks over the network and defenses | |
| Gruss et al. | Another flip in the wall of rowhammer defenses | |
| Wang et al. | Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX | |
| Kwong et al. | Rambleed: Reading bits in memory without accessing them | |
| Lee et al. | An {Off-Chip} attack on hardware enclaves via the memory bus | |
| Jang et al. | SGX-Bomb: Locking down the processor via Rowhammer attack | |
| EP3758287B1 (en) | Deterministic encryption key rotation | |
| Bhattacharya et al. | Curious case of rowhammer: flipping secret exponent bits using timing analysis | |
| Gruss et al. | Prefetch side-channel attacks: Bypassing SMAP and kernel ASLR | |
| US20210351911A1 (en) | Techniques for preventing memory timing attacks | |
| US8364973B2 (en) | Dynamic generation of integrity manifest for run-time verification of software program | |
| Wu et al. | Protecting page tables from rowhammer attacks using monotonic pointers in dram true-cells | |
| Saxena et al. | Pt-guard: Integrity-protected page tables to defend against breakthrough rowhammer attacks | |
| Bhattacharya et al. | Advanced fault attacks in software: Exploiting the RowHammer bug | |
| Zhang et al. | {CacheWarp}: Software-based Fault Injection using Selective State Reset | |
| Oliverio et al. | Secure Page Fusion with VUsion: https://www. vusec. net/projects/VUsion | |
| US20250148133A1 (en) | Security management of ferroelectric memory device | |
| Yim | The rowhammer attack injection methodology | |
| CN110799979B (en) | Secure Key Storage for Multi-Core Processors | |
| Canpolat et al. | Chronus: Understanding and securing the cutting-edge industry solutions to dram read disturbance | |
| Canpolat et al. | Breakhammer: Enhancing rowhammer mitigations by carefully throttling suspect threads | |
| Orosa et al. | Dataplant: Enhancing system security with low-cost in-dram value generation primitives | |
| Adiletta et al. | Mayhem: Targeted corruption of register and stack variables | |
| Zhang et al. | SoK: Rowhammer on commodity operating systems |