Study of Row Hammer attack
The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security rese...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-01-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018007 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities. |
---|---|
ISSN: | 2096-109X |