A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis
[chapter]
2016
Lecture Notes in Computer Science
An intelligent combination of timing Prime + Probe attack and row-buffer collision is shown to induce bit flip faults in a 1024 bit RSA key on modern processors using realistic number of hammering attempts ...
In this paper, we develop a methodology to combine timing analysis to perform the hammering in a controlled manner to create bit flips in cryptographic keys which are stored in memory. ...
Combining Timing Analysis and Rowhammer In this section we discuss the development of an algorithm to induce bit flip in the secret exponent by combining timing analysis and DRAM vulnerability. ...
doi:10.1007/978-3-662-53140-2_29
fatcat:42mmvsnuhva43jvfcttluduhoa
Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications
[article]
2021
arXiv
pre-print
We find that the DRAM modules we analyze are vulnerable to RowHammer, having bit flips in up to 99.9% of all DRAM rows. ...
We show how U-TRR allows us to craft RowHammer access patterns that successfully circumvent the TRR mechanisms employed in 45 DRAM modules of the three major DRAM vendors. ...
Mukhopadhyay, “Curious Case of Rowhammer: Flipping Trusted Execution, 2017.
Secret Exponent Bits Using Timing Analysis,” in CHES, 2016. ...
arXiv:2110.10603v1
fatcat:ab7zgdwb3vaqtbszjmyxuvngny