Systematic classification of side-channel attacks: A case study for mobile devices
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
On DRAM rowhammer and the physics of insecurity
AJ Walker, S Lee, D Beery - IEEE Transactions on Electron …, 2021 - ieeexplore.ieee.org
The dynamic random access memory (DRAM) disturb known as rowhammer (RH) has come
to dominate the insecurity of computing systems worldwide. Several studies have …
to dominate the insecurity of computing systems worldwide. Several studies have …
Plundervolt: Software-based fault injection attacks against Intel SGX
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …
growing heat and power consumption in modern processors. Design restrictions ensure …
RIDL: Rogue in-flight data load
We present Rogue In-flight Data Load (RIDL), a new class of speculative unprivileged and
constrained attacks to leak arbitrary data across address spaces and privilege boundaries …
constrained attacks to leak arbitrary data across address spaces and privilege boundaries …
A modern primer on processing in memory
Modern computing systems are overwhelmingly designed to move data to computation. This
design choice goes directly against at least three key trends in computing that cause …
design choice goes directly against at least three key trends in computing that cause …
Sok: Understanding the prevailing security vulnerabilities in trustzone-assisted tee systems
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …
TRRespass: Exploiting the many sides of target row refresh
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to
deliver what was meant to be the definitive hardware solution against the RowHammer …
deliver what was meant to be the definitive hardware solution against the RowHammer …
Processing data where it makes sense: Enabling in-memory computation
Today's systems are overwhelmingly designed to move data to computation. This design
choice goes directly against at least three key trends in systems that cause performance …
choice goes directly against at least three key trends in systems that cause performance …
Rowhammer: A retrospective
This retrospective paper describes the RowHammer problem in dynamic random access
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …
Error characterization, mitigation, and recovery in flash-memory-based solid-state drives
NAND flash memory is ubiquitous in everyday life today because its capacity has
continuously increased and cost has continuously decreased over decades. This positive …
continuously increased and cost has continuously decreased over decades. This positive …