Filters








4 Hits in 2.4 sec

RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks [article]

Samira Briongos, Pedro Malagón, José M. Moya, Thomas Eisenbarth
2019 arXiv   pre-print
As a consequence, several methods to stop cache attacks by detecting them have been proposed.  ...  Hence, online detection mechanisms that rely on these evictions can be circumvented as they do not detect be the introduced RELOAD+REFRESH attack.  ...  There are other tools, such as MASCAT [25] , which use code analysis techniques to detect potential attacks before running a program, as most anti-viruses do.  ... 
arXiv:1904.06278v1 fatcat:ojodieqvmrgkpacehrc7lzg2oi

Another Flip in the Wall of Rowhammer Defenses [article]

Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom
2018 arXiv   pre-print
Finally, we abuse Intel SGX to hide the attack entirely from the user and the operating system, making any inspection or detection of the attack infeasible.  ...  We demonstrate that our attacks evade all previously proposed countermeasures for commodity systems.  ...  [35] in MASCAT, an automated static code analysis tool to detect microarchitectural attacks on a large scale.  ... 
arXiv:1710.00551v2 fatcat:as43rayi2zadziuanflwh2qbri

Another Flip in the Wall of Rowhammer Defenses

Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom
2018 2018 IEEE Symposium on Security and Privacy (SP)  
Finally, we abuse Intel SGX to hide the attack entirely from the user and the operating system, making any inspection or detection of the attack infeasible.  ...  The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software, enabling powerful privilege-escalation attacks.  ...  [35] in MASCAT, an automated static code analysis tool to detect microarchitectural attacks on a large scale.  ... 
doi:10.1109/sp.2018.00031 dblp:conf/sp/GrussLSGJOSY18 fatcat:hzjmghpj2rfyjl7uu2ibfnj5mi

Mitigating Rowhammer attacks with software diversity

Manuel Wiesinger, Edgar Weippl
2018
This poses a dramatic security risk for modern computing systems, as it allows malicious attackers to manipulate data or even gain the control over entire systems.  ...  As existing attacks are typically based on the predictability of algorithms used in modern operating systems, we aim to prevent these predictability using software diversity.  ...  Section 3.4 presents MASCAT an approach detecting patterns of Rowhammer attacks in executable binaries.  ... 
doi:10.34726/hss.2018.47713 fatcat:f7c4vhzj4jewxjo5m436ctbebu