Rowhammer: A retrospective

O Mutlu, JS Kim - … Transactions on Computer-Aided Design of …, 2019 - ieeexplore.ieee.org
This retrospective paper describes the RowHammer problem in dynamic random access
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …

Rambleed: Reading bits in memory without accessing them

A Kwong, D Genkin, D Gruss… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
The Rowhammer bug is a reliability issue in DRAM cells that can enable an unprivileged
adversary to flip the values of bits in neighboring rows on the memory module. Previous …

Another flip in the wall of rowhammer defenses

D Gruss, M Lipp, M Schwarz, D Genkin… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from
unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated …

Throwhammer: Rowhammer attacks over the network and defenses

A Tatar, RK Konoth, E Athanasopoulos… - 2018 USENIX Annual …, 2018 - usenix.org
Increasingly sophisticated Rowhammer exploits allow an attacker that can execute code on
a vulnerable system to escalate privileges and compromise browsers, clouds, and mobile …

How practical are fault injection attacks, really?

J Breier, X Hou - IEEE Access, 2022 - ieeexplore.ieee.org
Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious
purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural …

Dsac: Low-cost rowhammer mitigation using in-dram stochastic and approximate counting algorithm

S Hong, D Kim, J Lee, R Oh, C Yoo, S Hwang… - arxiv preprint arxiv …, 2023 - arxiv.org
DRAM has scaled to achieve low cost per bit and this scaling has decreased Rowhammer
threshold. Thus, DRAM has adopted Target-Row-Refresh (TRR) which refreshes victim rows …

Fault attacks on secure embedded software: Threats, design, and evaluation

B Yuce, P Schaumont, M Witteman - Journal of Hardware and Systems …, 2018 - Springer
Embedded software is developed under the assumption that hardware execution is always
correct. Fault attacks break and exploit that assumption. Through the careful introduction of …

{ZebRAM}: Comprehensive and compatible software protection against rowhammer attacks

RK Konoth, M Oliverio, A Tatar, D Andriesse… - … USENIX Symposium on …, 2018 - usenix.org
The Rowhammer vulnerability common to many modern DRAM chips allows attackers to
trigger bit flips in a row of memory cells by accessing the adjacent rows at high frequencies …

Pseudorandom black swans: Cache attacks on CTR_DRBG

S Cohney, A Kwong, S Paz, D Genkin… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Modern cryptography requires the ability to securely generate pseudorandom numbers.
However, despite decades of work on side-channel attacks, there is little discussion of their …

Fault attacks on access control in processors: Threat, formal analysis and microarchitectural mitigation

ALD Antón, J Müller, MR Fadiheh, D Stoffel… - IEEE Access, 2023 - ieeexplore.ieee.org
Process isolation is a key component of the security architecture in any hardware/software
system. However, even when implemented correctly and comprehensively at the software …