Results 11 to 20 of about 894 (89)

How Practical Are Fault Injection Attacks, Really?

open access: yesIEEE Access, 2022
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural network implementations. There are many techniques that can be used
Jakub Breier, Xiaolu Hou
doaj   +1 more source

Fundamentally Understanding and Solving RowHammer

open access: yesProceedings of the 28th Asia and South Pacific Design Automation Conference, 2023
We provide an overview of recent developments and future directions in the RowHammer vulnerability that plagues modern DRAM (Dynamic Random Memory Access) chips, which are used in almost all computing systems as main memory. RowHammer is the phenomenon in which repeatedly accessing a row in a real DRAM chip causes bitflips (i.e., data corruption) in ...
Mutlu, Onur   +2 more
openaire   +3 more sources

JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
After years of development, FPGAs are finally making an appearance on multi-tenant cloud servers. Heterogeneous FPGA-CPU microarchitectures require reassessment of common assumptions about isolation and security boundaries, as they introduce new attack ...
Zane Weissman   +5 more
doaj   +1 more source

Drammer [PDF]

open access: yesProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing e orts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects in vulnerable physical memory locations.
Gruss, Daniel   +8 more
openaire   +1 more source

CAT-TWO: Counter-Based Adaptive Tree, Time Window Optimized for DRAM Row-Hammer Prevention

open access: yesIEEE Access, 2020
Row-hammering flips bits in a victim DRAM row by frequently activating its adjacent rows, compromising DRAM integrity. Several studies propose to prevent row-hammering by counting the number of activates to a DRAM row and refreshing the corresponding ...
Ingab Kang, Eojin Lee, Jung Ho Ahn
doaj   +1 more source

LightRoAD: Lightweight Rowhammer Attack Detector

open access: yes2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2021
Dynamic Random Access Memory (DRAM)-based systems are widely used in mobile and portable applications where low-cost and high-storage memory capability are required. However, such systems are prone to attacks. A latent threat to DRAM-based system security is the so-called Rowhammer attacks. By repeatedly accessing memory, an attacker is able to perform
Taouil, M. (author)   +3 more
openaire   +3 more sources

SCM : Secure Code Memory Architecture [PDF]

open access: yes, 2017
An increasing number of applications implemented on a SoC (System-on-chip) require security features. This work addresses the issue of protecting the integrity of code and read-only data that is stored in memory.
de Clercq, Ruan   +5 more
core   +2 more sources

Persistent Fault Attack in Practice

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Persistence fault analysis (PFA) is a novel fault analysis technique proposed in CHES 2018 and demonstrated with rowhammer-based fault injections. However, whether such analysis can be applied to traditional fault attack scenario, together with its ...
Fan Zhang   +8 more
doaj   +1 more source

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices [PDF]

open access: yes, 2017
Contains fulltext : 187230.pdf (preprint version ) (Open ...
Korak, Thomas   +3 more
core   +4 more sources

The AGI Containment Problem [PDF]

open access: yes, 2016
There is considerable uncertainty about what properties, capabilities and motivations future AGIs will have. In some plausible scenarios, AGIs may pose security risks arising from accidents and defects. In order to mitigate these risks, prudent early AGI
Babcock, James   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy