Ajou University repository

Detection technique of software-induced rowhammer attacksoa mark
Citations

SCOPUS

3

Citation Export

Publication Year
2021-01-01
Publisher
Tech Science Press
Citation
Computers, Materials and Continua, Vol.67, pp.349-367
Keyword
Bit flipDetecting techniqueRowhammer attackSide-channel attackStatic analysis
Mesh Keyword
Attack detectionCharacteristics of dynamicsCommon featuresDefense measuresEncryption keyHardware and softwareMitigation techniquesSensitive datas
All Science Classification Codes (ASJC)
BiomaterialsModeling and SimulationMechanics of MaterialsComputer Science ApplicationsElectrical and Electronic Engineering
Abstract
Side-channel attacks have recently progressed into software-induced attacks. In particular, a rowhammer attack, which exploits the characteristics of dynamic random access memory (DRAM), can quickly and continuously access the cells as the cell density of DRAM increases, thereby generating a disturbance error affecting the neighboring cells, resulting in bit flips. Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits, it has been reported that it can be exploited on various platforms such as mobile devices, web browsers, and virtual machines. Furthermore, there have been studies on bypassing the defense measures of DRAM manufacturers and the like to respond to rowhammer attacks. A rowhammer attack can control user access and compromise the integrity of sensitive data with attacks such as a privilege escalation and an alteration of the encryption keys. In an attempt to mitigate a rowhammer attack, various hardware- and software-based mitigation techniques are being studied, but there are limitations in that the research methods do not detect the rowhammer attack in advance, causing overhead or degradation of the system performance. Therefore, in this study, a rowhammer attack detection technique is proposed by extracting common features of rowhammer attack files through a static analysis of rowhammer attack codes.
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/31776
DOI
https://doi.org/10.32604/cmc.2021.014700
Fulltext

Type
Article
Funding
Funding Statement: This work was supported by a National Research Foundation of Korea (NRF) Grant funded by the Korean government (MSIT) (No. NRF-2017R1E1A1A01075110).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.