Results 31 to 40 of about 894 (89)
Детектування атак типу RowHummer за допомогою частотних масивів
Мета роботи: створення алгоритму захисту оперативної пам’яті DRAM від вразливості RowHammer, що не має вразливості нерівномірного оновлення. Результати дослідження: показано механізм детектування RowHammer на основі частотних масивів, що не має ...
Valentyn Mazurok, Volodymyr Lutsenko
doaj +1 more source
Survey of research on confidential computing
This paper provides a comprehensive overview of the development process of confidential computing, summarizing its current research status and issues, which focuses on the security requirements for data security and privacy protection. Abstract As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the ...
Dengguo Feng +5 more
wiley +1 more source
Rethinking the Producer-Consumer Relationship in Modern DRAM-Based Systems
Generational improvements to commodity DRAM throughout half a century have long solidified its prevalence as main memory across the computing industry. However, overcoming today’s DRAM technology scaling challenges requires new solutions driven by
Minesh Patel +6 more
doaj +1 more source
Practical Opcode-based Fault Attack on AES-NI
AES New Instructions (AES-NI) is a set of hardware instructions introduced by Intel to accelerate AES encryption and decryption, significantly improving efficiency across various cryptographic applications.
Xue Gong +6 more
doaj +1 more source
ret2spec: Speculative Execution Using Return Stack Buffers
Speculative execution is an optimization technique that has been part of CPUs for over a decade. It predicts the outcome and target of branch instructions to avoid stalling the execution pipeline.
Acıiccmez Onur +11 more
core +1 more source
Software-only Rowhammer Attacks and Countermeasures
Rowhammer is a hardware vulnerability in DRAM memory, where repeated access to memory (i.e., hammer rows) can induce bit flips in neighboring memory locations (i.e., victim rows). Being a hardware vulnerability, rowhammer bypasses all of the system memory protection, allowing adversaries to compromise the integrity and confidentiality of data.
openaire +2 more sources
We will discuss the RowHammer problem in DRAM, which is a prime (and likely the first) example of how a circuit-level failure mechanism in Dynamic Random Access Memory (DRAM) can cause a practical and widespread system security vulnerability. RowHammer is the phenomenon that repeatedly accessing a row in a modern DRAM chip predictably causes errors in ...
openaire +2 more sources
The Android Platform Security Model
Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones,
Brubaker, Chad +3 more
core
Randomized Line-to-Row Mapping for Low-Overhead Rowhammer Mitigations
Modern systems mitigate Rowhammer using victim refresh, which refreshes the two neighbours of an aggressor row when it encounters a specified number of activations.
Mathur, Saurav +2 more
core
REFault: A Fault Injection Platform for Rowhammer Research on DDR5 Memory [PDF]
DDR5 is showing increased resistance to Rowhammer attacks compared to previous generations. The minimum hammer count (HCmin) is a metric to assess the susceptibility of the DRAM substrate to Rowhammer.
Gloor, Stefan +2 more
core +2 more sources

