Results 61 to 70 of about 894 (89)

Schrodinger's Toolbox: Exploring the Quantum Rowhammer Attack

open access: yes
Residual cross-talk in superconducting qubit devices creates a security vulnerability for emerging quantum cloud services. We demonstrate a Clifford-only Quantum Rowhammer attack-using just X and CNOT gates-that injects faults on IBM's 127-qubit Eagle processors without requiring pulse-level access.
openaire   +2 more sources

Softhammer: Exploiting Rowhammer Bit Flips without Crashing

open access: yes
de Ridder, Finn   +2 more
openaire   +2 more sources

RISC-H: Rowhammer Attacks on RISC-V

open access: yes
Marazzi, Michele; id_orcid0000-0002-4124-0946   +1 more
openaire   +1 more source

Rowhammering Storage Devices

Proceedings of the 13th ACM Workshop on Hot Topics in Storage and File Systems, 2021
Peripheral devices like SSDs are growing more complex, to the point they are effectively small computers themselves. Our position is that this trend creates a new kind of attack vector, where untrusted software could use peripherals strictly as intended to accomplish unintended goals.
Tao Zhang   +4 more
openaire   +1 more source

Pinpoint Rowhammer

Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
In recent studies, sophisticated attack vectors that use a Rowhammer bug have been developed. These attacks are dangerous, given that they can corrupt data stored in arbitrary memory rows without accessing them. Successful Rowhammer attacks require to flip data of the target cell. However, non-target cells are also corrupted by the attacks.
Sangwoo Ji   +3 more
openaire   +1 more source

Quantifying Rowhammer Vulnerability for DRAM Security

2021 58th ACM/IEEE Design Automation Conference (DAC), 2021
Rowhammer is a memory-based attack that leverages capacitive-coupling to induce faults in modern dynamic random-access memory (DRAM). Over the last decade, a significant number of Rowhammer attacks have been presented to reveal that it is a severe security issue capable of causing privilege escalations, launching distributed denial-of-service (DDoS ...
Yichen Jiang   +5 more
openaire   +1 more source

The Rowhammer Attack Injection Methodology

2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), 2016
This paper presents a systematic methodology to identify and validate security attacks that exploit user influenceable hardware faults (i.e., rowhammer errors). We break down rowhammer attack procedures into nine generalized steps where some steps are designed to increase the attack success probabilities. Our framework can perform those nine operations
openaire   +1 more source

Revisiting Rowhammer Attacks in Embedded Systems

2019 14th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS), 2019
As the cell density of DRAM modules keeps increasing to guarantee the growing demand for memory capacity in modern computer and embedded system, the electromagnetic interference between memory cells increase significantly, leading to security vulnerabilities that can be exploited. In particular, the widespread Rowhammer vulnerability has been proven to
Lidia Pocero Fraile   +2 more
openaire   +1 more source

Flipper: Rowhammer on Steroids

Proceedings of the Microarchitecture Security Conference
The density of memory cells in modern DRAM is so high that frequently accessing a memory row can flip bits in nearby rows. That effect is called Rowhammer, and an attacker can exploit this phenomenon to flip bits by rapidly accessing the contents of nearby memory rows.
Martin Heckel, Florian Adamsky
openaire   +1 more source

Home - About - Disclaimer - Privacy