Plundervolt: Software-based fault injection attacks against Intel SGX
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …
growing heat and power consumption in modern processors. Design restrictions ensure …
Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …
Rowhammer. js: A remote software-induced fault attack in javascript
A fundamental assumption in software security is that a memory location can only be
modified by processes that may write to this memory location. However, a recent study has …
modified by processes that may write to this memory location. However, a recent study has …
TRRespass: Exploiting the many sides of target row refresh
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to
deliver what was meant to be the definitive hardware solution against the RowHammer …
deliver what was meant to be the definitive hardware solution against the RowHammer …
Drammer: Deterministic rowhammer attacks on mobile platforms
Recent work shows that the Rowhammer hardware bug can be used to craft powerful
attacks and completely subvert a system. However, existing efforts either describe …
attacks and completely subvert a system. However, existing efforts either describe …
Rowhammer: A retrospective
This retrospective paper describes the RowHammer problem in dynamic random access
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …
Rowpress: Amplifying read disturbance in modern dram chips
Memory isolation is critical for system reliability, security, and safety. Unfortunately, read
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
Revisiting rowhammer: An experimental analysis of modern dram devices and mitigation techniques
RowHammer is a circuit-level DRAM vulnerability, first rigorously analyzed and introduced in
2014, where repeatedly accessing data in a DRAM row can cause bit flips in nearby rows …
2014, where repeatedly accessing data in a DRAM row can cause bit flips in nearby rows …
Blacksmith: Scalable rowhammering in the frequency domain
We present the new class of non-uniform Rowhammer access patterns that bypass
undocumented, proprietary in-DRAM Target Row Refresh (TRR) while operating in a …
undocumented, proprietary in-DRAM Target Row Refresh (TRR) while operating in a …
Another flip in the wall of rowhammer defenses
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from
unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated …
unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated …