Results 31 to 40 of about 894 (89)

Детектування атак типу RowHummer за допомогою частотних масивів

open access: yesSocial Development & Security
Мета роботи: створення алгоритму захисту оперативної пам’яті DRAM від вразливості RowHammer, що не має вразливості нерівномірного оновлення. Результати дослідження: показано механізм детектування RowHammer на основі частотних масивів, що не має ...
Valentyn Mazurok, Volodymyr Lutsenko
doaj   +1 more source

Survey of research on confidential computing

open access: yesIET Communications, Volume 18, Issue 9, Page 535-556, June 2024.
This paper provides a comprehensive overview of the development process of confidential computing, summarizing its current research status and issues, which focuses on the security requirements for data security and privacy protection. Abstract As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the ...
Dengguo Feng   +5 more
wiley   +1 more source

Rethinking the Producer-Consumer Relationship in Modern DRAM-Based Systems

open access: yesIEEE Access
Generational improvements to commodity DRAM throughout half a century have long solidified its prevalence as main memory across the computing industry. However, overcoming today’s DRAM technology scaling challenges requires new solutions driven by
Minesh Patel   +6 more
doaj   +1 more source

Practical Opcode-based Fault Attack on AES-NI

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
AES New Instructions (AES-NI) is a set of hardware instructions introduced by Intel to accelerate AES encryption and decryption, significantly improving efficiency across various cryptographic applications.
Xue Gong   +6 more
doaj   +1 more source

ret2spec: Speculative Execution Using Return Stack Buffers

open access: yes, 2018
Speculative execution is an optimization technique that has been part of CPUs for over a decade. It predicts the outcome and target of branch instructions to avoid stalling the execution pipeline.
Acıiccmez Onur   +11 more
core   +1 more source

Software-only Rowhammer Attacks and Countermeasures

open access: yes, 2021
Rowhammer is a hardware vulnerability in DRAM memory, where repeated access to memory (i.e., hammer rows) can induce bit flips in neighboring memory locations (i.e., victim rows). Being a hardware vulnerability, rowhammer bypasses all of the system memory protection, allowing adversaries to compromise the integrity and confidentiality of data.
openaire   +2 more sources

RowHammer and Beyond

open access: yes, 2019
We will discuss the RowHammer problem in DRAM, which is a prime (and likely the first) example of how a circuit-level failure mechanism in Dynamic Random Access Memory (DRAM) can cause a practical and widespread system security vulnerability. RowHammer is the phenomenon that repeatedly accessing a row in a modern DRAM chip predictably causes errors in ...
openaire   +2 more sources

The Android Platform Security Model

open access: yes, 2020
Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones,
Brubaker, Chad   +3 more
core  

Randomized Line-to-Row Mapping for Low-Overhead Rowhammer Mitigations

open access: yes, 2023
Modern systems mitigate Rowhammer using victim refresh, which refreshes the two neighbours of an aggressor row when it encounters a specified number of activations.
Mathur, Saurav   +2 more
core  

REFault: A Fault Injection Platform for Rowhammer Research on DDR5 Memory [PDF]

open access: yes
DDR5 is showing increased resistance to Rowhammer attacks compared to previous generations. The minimum hammer count (HCmin) is a metric to assess the susceptibility of the DRAM substrate to Rowhammer.
Gloor, Stefan   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy