Study of Row Hammer attack

The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security rese...

Full description

Saved in:
Bibliographic Details
Main Authors: Wenwei WANG, Peishun LIU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-01-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018007
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530128901865472
author Wenwei WANG
Peishun LIU
author_facet Wenwei WANG
Peishun LIU
author_sort Wenwei WANG
collection DOAJ
description The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities.
format Article
id doaj-art-5714a5afd7b44405a091e5f5b4cdcdf5
institution Kabale University
issn 2096-109X
language English
publishDate 2018-01-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-5714a5afd7b44405a091e5f5b4cdcdf52025-01-15T03:12:32ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-01-014697559552655Study of Row Hammer attackWenwei WANGPeishun LIUThe related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018007Row Hammerprivilege escalationDRAMcache evictionpage table sprayingmemory waylaying
spellingShingle Wenwei WANG
Peishun LIU
Study of Row Hammer attack
网络与信息安全学报
Row Hammer
privilege escalation
DRAM
cache eviction
page table spraying
memory waylaying
title Study of Row Hammer attack
title_full Study of Row Hammer attack
title_fullStr Study of Row Hammer attack
title_full_unstemmed Study of Row Hammer attack
title_short Study of Row Hammer attack
title_sort study of row hammer attack
topic Row Hammer
privilege escalation
DRAM
cache eviction
page table spraying
memory waylaying
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018007
work_keys_str_mv AT wenweiwang studyofrowhammerattack
AT peishunliu studyofrowhammerattack