Student Work

RowHammer; A Review of the Exploit Used to Access Protected, Inaccessible Memory

Public

Downloadable Content

open in viewer

This MQP explores an implementation of the Rowhammer attack [1] on a Unix server using DDR3 memory to access normally in-accessible memory through a vulnerability in the physical hardware that exploits the tendency of cells in DRAM to experience voltage leakage which leads to data errors. The setup for the attack, and organizing virtual memory to align to physical memory, and attacking cells housed in the same bank is explored using side channels. These side channel attacks focus on finding memory that appears consecutively in both physical and virtual memory, and aligning a victim row between two attacking rows, and reading from the attacking row at a high rate of speed in order to flip bits in the victim row.

  • This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
Creator
Publisher
Identifier
  • E-project-012022-235451
  • 46591
Keyword
Advisor
Year
  • 2022
Date created
  • 2022-01-20
Resource type
Major
Rights statement

Relations

In Collection:

Items

Items

Permanent link to this page: https://digital.wpi.edu/show/f7623g76k