publication . Conference object . Other literature type . 2016

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

Gruss, Daniel; Maurice, Clémentine; Veen, Victor Van Der; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano; Fratantonio, Yanick; Lindorfer, Martina; Vigna, Giovanni;
Open Access
  • Published: 24 Oct 2016
  • Publisher: Association for Computing Machinery (ACM)
Abstract
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing e orts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects in vulnerable physical memory locations. Moreover, prior work only targets x86 and researchers have openly wondered whether Rowhammer attacks on other architectures, such as ARM, are even possible. We show that deterministic Rowhammer attacks are feasible on commodity mobile platforms and that they cannot be mitigated by current defenses. Rather than assuming special ...
Subjects
free text keywords: classrowhammer, classmobile, Software, Computer Networks and Communications
Funded by
EC| HECTOR
Project
HECTOR
HARDWARE ENABLED CRYPTO AND RANDOMNESS
  • Funder: European Commission (EC)
  • Project Code: 644052
  • Funding stream: H2020 | RIA
Download fromView all 3 versions
ZENODO
Conference object . 2016
Provider: ZENODO
http://dx.doi.org/10.5281/zeno...
Other literature type . 2016
Provider: Datacite
DSpace at VU
Conference object . 2016
Provider: NARCIS
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Conference object . Other literature type . 2016

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

Gruss, Daniel; Maurice, Clémentine; Veen, Victor Van Der; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano; Fratantonio, Yanick; Lindorfer, Martina; Vigna, Giovanni;