RowHammer; A Review of the Exploit Used to Access Protected, Inaccessible Memory
PublicContenu téléchargeable
open in viewerThis MQP explores an implementation of the Rowhammer attack [1] on a Unix server using DDR3 memory to access normally in-accessible memory through a vulnerability in the physical hardware that exploits the tendency of cells in DRAM to experience voltage leakage which leads to data errors. The setup for the attack, and organizing virtual memory to align to physical memory, and attacking cells housed in the same bank is explored using side channels. These side channel attacks focus on finding memory that appears consecutively in both physical and virtual memory, and aligning a victim row between two attacking rows, and reading from the attacking row at a high rate of speed in order to flip bits in the victim row.
- This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
- Creator
- Publisher
- Identifier
- E-project-012022-235451
- 46591
- Mot-clé
- Advisor
- Year
- 2022
- Date created
- 2022-01-20
- Resource type
- Major
- Rights statement
Relations
- Dans Collection:
Contenu
Articles
La vignette | Titre | Visibilité | Embargo Release Date | actes |
---|---|---|---|---|
black_and_white_MQP_Final.pdf | Public | Télécharger |
Permanent link to this page: https://digital.wpi.edu/show/f7623g76k