Study of Row Hammer attack
The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security rese...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-01-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018007 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530128901865472 |
---|---|
author | Wenwei WANG Peishun LIU |
author_facet | Wenwei WANG Peishun LIU |
author_sort | Wenwei WANG |
collection | DOAJ |
description | The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities. |
format | Article |
id | doaj-art-5714a5afd7b44405a091e5f5b4cdcdf5 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2018-01-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-5714a5afd7b44405a091e5f5b4cdcdf52025-01-15T03:12:32ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-01-014697559552655Study of Row Hammer attackWenwei WANGPeishun LIUThe related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018007Row Hammerprivilege escalationDRAMcache evictionpage table sprayingmemory waylaying |
spellingShingle | Wenwei WANG Peishun LIU Study of Row Hammer attack 网络与信息安全学报 Row Hammer privilege escalation DRAM cache eviction page table spraying memory waylaying |
title | Study of Row Hammer attack |
title_full | Study of Row Hammer attack |
title_fullStr | Study of Row Hammer attack |
title_full_unstemmed | Study of Row Hammer attack |
title_short | Study of Row Hammer attack |
title_sort | study of row hammer attack |
topic | Row Hammer privilege escalation DRAM cache eviction page table spraying memory waylaying |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018007 |
work_keys_str_mv | AT wenweiwang studyofrowhammerattack AT peishunliu studyofrowhammerattack |