Results 21 to 30 of about 894 (89)

Persistent Fault Analysis on Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for years. In this paper, the feature of persistence is applied to fault attacks, and the persistent fault attack is proposed.
Fan Zhang   +7 more
doaj   +1 more source

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

ALARM: Active LeArning of Rowhammer Mitigations

open access: yesProceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, 2022
Rowhammer is a serious security problem of contemporary dynamic random-access memory (DRAM) where reads or writes of bits can flip other bits. DRAM manufacturers add mitigations, but don't disclose details, making it difficult for customers to evaluate their efficacy.
Amir Naseredini   +3 more
openaire   +2 more sources

Exploiting Inter- and Intra-Memory Asymmetries for Data Mapping in Hybrid Tiered-Memories

open access: yes, 2020
Modern computing systems are embracing hybrid memory comprising of DRAM and non-volatile memory (NVM) to combine the best properties of both memory technologies, achieving low latency, high reliability, and high density.
Antognetti P.   +32 more
core   +1 more source

Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer [PDF]

open access: yes, 2018
With software becoming harder to compromise due to modern defenses, attackers are increasingly looking at exploiting hardware vulnerabilities such as Rowhammer. In response, the research community has developed several software defenses to protect existing hardware against this threat.
Tatar, Andrei   +3 more
openaire   +2 more sources

Improving Phase Change Memory Performance with Data Content Aware Access

open access: yes, 2020
A prominent characteristic of write operation in Phase-Change Memory (PCM) is that its latency and energy are sensitive to the data to be written as well as the content that is overwritten.
Ahn S. J.   +54 more
core   +1 more source

Підвищення ефективності Row-Sampling методів для захисту від атак типу Row-Hummer

open access: yesSocial Development & Security
Мета роботи: провести аналіз захисту систем від атак типу RowHammer на основі методу вибірки рядків та запропонувати її покращення використовуючи більш реалістичну модель пам’яті та модель атаки.
Valentyn Mazurok, Volodymyr Lutsenko
doaj   +1 more source

SpyHammer: Understanding and Exploiting RowHammer Under Fine-Grained Temperature Variations

open access: yesIEEE Access
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row solely by accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate that new DRAM devices are becoming increasingly vulnerable to RowHammer, and ...
Lois Orosa   +9 more
doaj   +1 more source

Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks

open access: yes, 2019
Despite the great achievements of deep neural networks (DNNs), the vulnerability of state-of-the-art DNNs raises security concerns of DNNs in many application domains requiring high reliability.We propose the fault sneaking attack on DNNs, where the ...
Biggio B.   +8 more
core   +1 more source

Nethammer: Inducing Rowhammer Faults through Network Requests [PDF]

open access: yes2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020
A fundamental assumption in software security is that memory contents do not change unless there is a legitimate deliberate modification. Classical fault attacks show that this assumption does not hold if the attacker has physical access. Rowhammer attacks showed that local code execution is already sufficient to break this assumption.
Lipp, Moritz   +6 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy