2 Hits in 3.5 sec

Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis [chapter]

Sarani Bhattacharya, Debdeep Mukhopadhyay
2016 Lecture Notes in Computer Science  
An intelligent combination of timing Prime + Probe attack and row-buffer collision is shown to induce bit flip faults in a 1024 bit RSA key on modern processors using realistic number of hammering attempts  ...  In this paper, we develop a methodology to combine timing analysis to perform the hammering in a controlled manner to create bit flips in cryptographic keys which are stored in memory.  ...  Combining Timing Analysis and Rowhammer In this section we discuss the development of an algorithm to induce bit flip in the secret exponent by combining timing analysis and DRAM vulnerability.  ... 
doi:10.1007/978-3-662-53140-2_29 fatcat:42mmvsnuhva43jvfcttluduhoa

Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications [article]

Hasan Hassan, Yahya Can Tugrul, Jeremie S. Kim, Victor van der Veen, Kaveh Razavi, Onur Mutlu
2021 arXiv   pre-print
We find that the DRAM modules we analyze are vulnerable to RowHammer, having bit flips in up to 99.9% of all DRAM rows.  ...  We show how U-TRR allows us to craft RowHammer access patterns that successfully circumvent the TRR mechanisms employed in 45 DRAM modules of the three major DRAM vendors.  ...  Mukhopadhyay, “Curious Case of Rowhammer: Flipping Trusted Execution, 2017. Secret Exponent Bits Using Timing Analysis,” in CHES, 2016.  ... 
arXiv:2110.10603v1 fatcat:ab7zgdwb3vaqtbszjmyxuvngny