Open Access iconOpen Access

ARTICLE

crossmark

Detection Technique of Software-Induced Rowhammer Attacks

Minkyung Lee1, Jin Kwak2,*

1 ISAA Lab., Department of Computer Engineering, Ajou University, Suwon, 16499, Korea
2 Department of Cyber Security, Ajou University, Suwon, 16499, Korea

* Corresponding Author: Jin Kwak. Email: email

Computers, Materials & Continua 2021, 67(1), 349-367. https://doi.org/10.32604/cmc.2021.014700

Abstract

Side-channel attacks have recently progressed into software-induced attacks. In particular, a rowhammer attack, which exploits the characteristics of dynamic random access memory (DRAM), can quickly and continuously access the cells as the cell density of DRAM increases, thereby generating a disturbance error affecting the neighboring cells, resulting in bit flips. Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits, it has been reported that it can be exploited on various platforms such as mobile devices, web browsers, and virtual machines. Furthermore, there have been studies on bypassing the defense measures of DRAM manufacturers and the like to respond to rowhammer attacks. A rowhammer attack can control user access and compromise the integrity of sensitive data with attacks such as a privilege escalation and an alteration of the encryption keys. In an attempt to mitigate a rowhammer attack, various hardware- and software-based mitigation techniques are being studied, but there are limitations in that the research methods do not detect the rowhammer attack in advance, causing overhead or degradation of the system performance. Therefore, in this study, a rowhammer attack detection technique is proposed by extracting common features of rowhammer attack files through a static analysis of rowhammer attack codes.

Keywords


Cite This Article

APA Style
Lee, M., Kwak, J. (2021). Detection technique of software-induced rowhammer attacks. Computers, Materials & Continua, 67(1), 349-367. https://doi.org/10.32604/cmc.2021.014700
Vancouver Style
Lee M, Kwak J. Detection technique of software-induced rowhammer attacks. Comput Mater Contin. 2021;67(1):349-367 https://doi.org/10.32604/cmc.2021.014700
IEEE Style
M. Lee and J. Kwak, “Detection Technique of Software-Induced Rowhammer Attacks,” Comput. Mater. Contin., vol. 67, no. 1, pp. 349-367, 2021. https://doi.org/10.32604/cmc.2021.014700



cc Copyright © 2021 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2439

    View

  • 1532

    Download

  • 1

    Like

Share Link