2019
DOI: 10.48550/arxiv.1912.11523
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms

Abstract: After years of development, FPGAs are finally making an appearance on multi-tenant cloud servers. These heterogeneous FPGA-CPU architectures break common assumptions about isolation and security boundaries. Since the FPGA and CPU architectures share hardware resources, a new class of vulnerabilities requires us to reassess the security and dependability of these platforms.In this work, we analyze the memory and cache subsystem and study Rowhammer and cache attacks enabled on two proposed heterogeneous FPGA-CPU… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…The RowHammer vulnerability can be used to reliably induce bit flips in main memory using various system-level security attacks [1,10,13,20,21,26,27,33,34,39,43,49,56,78,85,99,101,118,119,122,129,133,145,150,151,156,158,167,171]. Prior work demonstrates that inducing bit flips via a RowHammer attack is practical for privilege escalation [33,34,56,85,122,133,150,158], denial of service [33,85], leaking confidential data [78], and manipulating a critical application's correctness [43,167].…”
Section: The Rowhammer Vulnerabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…The RowHammer vulnerability can be used to reliably induce bit flips in main memory using various system-level security attacks [1,10,13,20,21,26,27,33,34,39,43,49,56,78,85,99,101,118,119,122,129,133,145,150,151,156,158,167,171]. Prior work demonstrates that inducing bit flips via a RowHammer attack is practical for privilege escalation [33,34,56,85,122,133,150,158], denial of service [33,85], leaking confidential data [78], and manipulating a critical application's correctness [43,167].…”
Section: The Rowhammer Vulnerabilitymentioning
confidence: 99%
“…RowHammer Attacks and Defenses. Many works [1,10,13,20,21,26,27,33,34,39,43,49,56,78,85,99,101,118,119,122,129,133,145,150,151,156,158,167,171] exploit the RowHammer vulnerability to induce bit flips in main memory, as §2.3 explains. These works activate two (double-sided attack [71,72,133]) or more (many-sided attack [27]) aggressor rows, as rapidly as possible, aiming to maximize the number of RowHammer-induced bit flips.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A security attack exploits the RowHammer vulnerability by hammering (i.e., repeatedly activating and precharging) an aggressor row many times (e.g., 139𝐾 in DDR3 [56], 10𝐾 in DDR4 [54], and 4.8𝐾 in LPDDR4 [54]) 1 to cause bit flips in the cells of the victim rows that are physically adjacent to the hammered row. Since the discovery of RowHammer, researchers have proposed many techniques that take advantage of the RowHammer vulnerability to compromise operating systems [7,15,16,29,38,44,62,96,98,109,123,124,128,140], web browsers [8,19,23,24,28], cloud virtual machines [100,129], remote servers [71,122], and deep neural networks [34,136]. 2 Thus, RowHammer is a clear major threat to system security.…”
Section: Introductionmentioning
confidence: 99%
“…Kim et al [73] show that modern DRAM chips are susceptible to the RowHammer phenomenon, where opening and closing (i.e., activating and precharging) a DRAM row (i.e., aggressor row) at a high enough rate (i.e., hammering) can cause bit-flips in physicallynearby rows (i.e., victim rows) [101,104,121,159]. Many works demonstrate various system-level attacks using Row-Hammer to escalate privilege or leak private data (e.g., [1,10,13,24,25,34,35,41,42,47,50,56,79,87,101,104,117,118,120,126,127,144,147,148,151,156,160,163]). Recent findings indicate that RowHammer is a more serious problem than ever and that it is expected to worsen for future DRAM chips [72,101,104].…”
Section: Introductionmentioning
confidence: 99%