Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript

Conference object, Preprint OPEN
Gruss, Daniel; Maurice, Clémentine; Mangard, Stefan;
(2015)
  • Related identifiers: doi: 10.5281/zenodo.55447
  • Subject: Computer Science - Cryptography and Security
    acm: Hardware_MEMORYSTRUCTURES

A fundamental assumption in software security is that a memory location can only be modified by processes that may write to this memory location. However, a recent study has shown that parasitic effects in DRAM can change the content of a memory cell without accessing i... View more
  • References (40)
    40 references, page 1 of 4

    1. Aichinger, B.: DDR memory errors caused by Row Hammer. In: HPEC'15 (2015)

    2. Aichinger, B.: Row Hammer Failures in DDR Memory. In: memcon'15 (2015)

    3. Al-Ars, Z.: DRAM fault analysis and test generation. TU Delft (2005)

    4. Aweke, Z.B., Yitbarek, S.F., Qiao, R., Das, R., Hicks, M., Oren, Y., Austin, T.: ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks. In: ASLPOS'16 (2016)

    5. Bains, K., Halbert, J.: Row hammer monitoring based on stored row hammer threshold value (Jun 5 2014), US Patent App. 13/690,523

    6. Bains, K., Halbert, J., Mozak, C., Schoenborn, T., Green eld, Z.: Row hammer refresh command (Jan 2 2014), US Patent App. 13/539,415

    7. Barresi, A., Razavi, K., Payer, M., Gross, T.R.: CAIN: silently breaking ASLR in the cloud. In: WOOT'15 (2015)

    8. Bernstein, D.J.: Cache-timing attacks on AES. Tech. rep., Department of Mathematics, Statistics, and Computer Science, University of Illinois at Chicago (2005)

    9. Biham, E., Shamir, A.: Di erential fault analysis of secret key cryptosystems. In: CRYPTO '97. LNCS, vol. 1294 (1997)

    10. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. In: EUROCRYPT'97. LNCS, vol. 1233 (1997)

  • Related Organizations (1)
  • Metrics
Share - Bookmark