Results 11 to 20 of about 894 (89)
How Practical Are Fault Injection Attacks, Really?
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural network implementations. There are many techniques that can be used
Jakub Breier, Xiaolu Hou
doaj +1 more source
Fundamentally Understanding and Solving RowHammer
We provide an overview of recent developments and future directions in the RowHammer vulnerability that plagues modern DRAM (Dynamic Random Memory Access) chips, which are used in almost all computing systems as main memory. RowHammer is the phenomenon in which repeatedly accessing a row in a real DRAM chip causes bitflips (i.e., data corruption) in ...
Mutlu, Onur +2 more
openaire +3 more sources
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
After years of development, FPGAs are finally making an appearance on multi-tenant cloud servers. Heterogeneous FPGA-CPU microarchitectures require reassessment of common assumptions about isolation and security boundaries, as they introduce new attack ...
Zane Weissman +5 more
doaj +1 more source
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing e orts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects in vulnerable physical memory locations.
Gruss, Daniel +8 more
openaire +1 more source
CAT-TWO: Counter-Based Adaptive Tree, Time Window Optimized for DRAM Row-Hammer Prevention
Row-hammering flips bits in a victim DRAM row by frequently activating its adjacent rows, compromising DRAM integrity. Several studies propose to prevent row-hammering by counting the number of activates to a DRAM row and refreshing the corresponding ...
Ingab Kang, Eojin Lee, Jung Ho Ahn
doaj +1 more source
LightRoAD: Lightweight Rowhammer Attack Detector
Dynamic Random Access Memory (DRAM)-based systems are widely used in mobile and portable applications where low-cost and high-storage memory capability are required. However, such systems are prone to attacks. A latent threat to DRAM-based system security is the so-called Rowhammer attacks. By repeatedly accessing memory, an attacker is able to perform
Taouil, M. (author) +3 more
openaire +3 more sources
SCM : Secure Code Memory Architecture [PDF]
An increasing number of applications implemented on a SoC (System-on-chip) require security features. This work addresses the issue of protecting the integrity of code and read-only data that is stored in memory.
de Clercq, Ruan +5 more
core +2 more sources
Persistent Fault Attack in Practice
Persistence fault analysis (PFA) is a novel fault analysis technique proposed in CHES 2018 and demonstrated with rowhammer-based fault injections. However, whether such analysis can be applied to traditional fault attack scenario, together with its ...
Fan Zhang +8 more
doaj +1 more source
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices [PDF]
Contains fulltext : 187230.pdf (preprint version ) (Open ...
Korak, Thomas +3 more
core +4 more sources
The AGI Containment Problem [PDF]
There is considerable uncertainty about what properties, capabilities and motivations future AGIs will have. In some plausible scenarios, AGIs may pose security risks arising from accidents and defects. In order to mitigate these risks, prudent early AGI
Babcock, James +2 more
core +3 more sources

