Results 21 to 30 of about 894 (89)
Persistent Fault Analysis on Block Ciphers
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for years. In this paper, the feature of persistence is applied to fault attacks, and the persistent fault attack is proposed.
Fan Zhang +7 more
doaj +1 more source
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
ALARM: Active LeArning of Rowhammer Mitigations
Rowhammer is a serious security problem of contemporary dynamic random-access memory (DRAM) where reads or writes of bits can flip other bits. DRAM manufacturers add mitigations, but don't disclose details, making it difficult for customers to evaluate their efficacy.
Amir Naseredini +3 more
openaire +2 more sources
Exploiting Inter- and Intra-Memory Asymmetries for Data Mapping in Hybrid Tiered-Memories
Modern computing systems are embracing hybrid memory comprising of DRAM and non-volatile memory (NVM) to combine the best properties of both memory technologies, achieving low latency, high reliability, and high density.
Antognetti P. +32 more
core +1 more source
Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer [PDF]
With software becoming harder to compromise due to modern defenses, attackers are increasingly looking at exploiting hardware vulnerabilities such as Rowhammer. In response, the research community has developed several software defenses to protect existing hardware against this threat.
Tatar, Andrei +3 more
openaire +2 more sources
Improving Phase Change Memory Performance with Data Content Aware Access
A prominent characteristic of write operation in Phase-Change Memory (PCM) is that its latency and energy are sensitive to the data to be written as well as the content that is overwritten.
Ahn S. J. +54 more
core +1 more source
Підвищення ефективності Row-Sampling методів для захисту від атак типу Row-Hummer
Мета роботи: провести аналіз захисту систем від атак типу RowHammer на основі методу вибірки рядків та запропонувати її покращення використовуючи більш реалістичну модель пам’яті та модель атаки.
Valentyn Mazurok, Volodymyr Lutsenko
doaj +1 more source
SpyHammer: Understanding and Exploiting RowHammer Under Fine-Grained Temperature Variations
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row solely by accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate that new DRAM devices are becoming increasingly vulnerable to RowHammer, and ...
Lois Orosa +9 more
doaj +1 more source
Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks
Despite the great achievements of deep neural networks (DNNs), the vulnerability of state-of-the-art DNNs raises security concerns of DNNs in many application domains requiring high reliability.We propose the fault sneaking attack on DNNs, where the ...
Biggio B. +8 more
core +1 more source
Nethammer: Inducing Rowhammer Faults through Network Requests [PDF]
A fundamental assumption in software security is that memory contents do not change unless there is a legitimate deliberate modification. Classical fault attacks show that this assumption does not hold if the attacker has physical access. Rowhammer attacks showed that local code execution is already sufficient to break this assumption.
Lipp, Moritz +6 more
openaire +3 more sources

