2016
DOI: 10.1007/978-3-662-53140-2_29
|View full text |Cite
|
Sign up to set email alerts
|

Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
85
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 76 publications
(85 citation statements)
references
References 11 publications
0
85
0
Order By: Relevance
“…Such addresses are accessed one after the other so as to force the eviction of our aggressor row. This can be achieved through the use of a timing attack to find out the eviction set [12,17,18], or by using reverse engineering study of the Device under attack, focusing on manipulating the complex hash functions used by modern Intel processor to further partition the cache into slices [9]. On another approach proposed in [1], rowhammer is triggered with non-temporal store instructions, specifically libc functions, taking advantages of its cache bypass characteristic.…”
Section: Managing To Activate Rows In Each Bank Fast Enough To Triggementioning
confidence: 99%
See 4 more Smart Citations
“…Such addresses are accessed one after the other so as to force the eviction of our aggressor row. This can be achieved through the use of a timing attack to find out the eviction set [12,17,18], or by using reverse engineering study of the Device under attack, focusing on manipulating the complex hash functions used by modern Intel processor to further partition the cache into slices [9]. On another approach proposed in [1], rowhammer is triggered with non-temporal store instructions, specifically libc functions, taking advantages of its cache bypass characteristic.…”
Section: Managing To Activate Rows In Each Bank Fast Enough To Triggementioning
confidence: 99%
“…Attacks that was mounted after consulting their own pagemap interface to obtain the corresponding physical address of each element have been relegated to be applicable just on Linux kernel versions at most 4.0 [12,18]. Exploitation technics based on probabilistic approaches that just pick a random virtual address to trigger the bug [10,11] are based on test code [14] and on the native code of the work in [17].…”
Section: Access the Aggressor Physical Address From Userlandmentioning
confidence: 99%
See 3 more Smart Citations