+

Xiao et al., 2016 - Google Patents

One bit flips, one cloud flops:{Cross-VM} row hammer attacks and privilege escalation

Xiao et al., 2016

View PDF
Document ID
3265151246986587782
Author
Xiao Y
Zhang X
Zhang Y
Teodorescu R
Publication year
Publication venue
25th USENIX security symposium (USENIX Security 16)

External Links

Snippet

Row hammer attacks exploit electrical interactions between neighboring memory cells in high-density dynamic random-access memory (DRAM) to induce memory errors. By rapidly and repeatedly accessing DRAMs with specific patterns, an adversary with limited privilege …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/10Address translation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
    • G06F12/0893Caches characterised by their organisation or structure
    • G06F12/0895Caches characterised by their organisation or structure of parts of caches, e.g. directory or tag array
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • G06F12/1491Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings

Similar Documents

Publication Publication Date Title
Xiao et al. One bit flips, one cloud flops:{Cross-VM} row hammer attacks and privilege escalation
Tatar et al. Throwhammer: Rowhammer attacks over the network and defenses
Gruss et al. Another flip in the wall of rowhammer defenses
Wang et al. Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
Kwong et al. Rambleed: Reading bits in memory without accessing them
Lee et al. An {Off-Chip} attack on hardware enclaves via the memory bus
Jang et al. SGX-Bomb: Locking down the processor via Rowhammer attack
EP3758287B1 (en) Deterministic encryption key rotation
Bhattacharya et al. Curious case of rowhammer: flipping secret exponent bits using timing analysis
Gruss et al. Prefetch side-channel attacks: Bypassing SMAP and kernel ASLR
US20210351911A1 (en) Techniques for preventing memory timing attacks
US8364973B2 (en) Dynamic generation of integrity manifest for run-time verification of software program
Wu et al. Protecting page tables from rowhammer attacks using monotonic pointers in dram true-cells
Saxena et al. Pt-guard: Integrity-protected page tables to defend against breakthrough rowhammer attacks
Bhattacharya et al. Advanced fault attacks in software: Exploiting the RowHammer bug
Zhang et al. {CacheWarp}: Software-based Fault Injection using Selective State Reset
Oliverio et al. Secure Page Fusion with VUsion: https://www. vusec. net/projects/VUsion
US20250148133A1 (en) Security management of ferroelectric memory device
Yim The rowhammer attack injection methodology
CN110799979B (en) Secure Key Storage for Multi-Core Processors
Canpolat et al. Chronus: Understanding and securing the cutting-edge industry solutions to dram read disturbance
Canpolat et al. Breakhammer: Enhancing rowhammer mitigations by carefully throttling suspect threads
Orosa et al. Dataplant: Enhancing system security with low-cost in-dram value generation primitives
Adiletta et al. Mayhem: Targeted corruption of register and stack variables
Zhang et al. SoK: Rowhammer on commodity operating systems
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载