Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms
- Resource Type
- Authors
- Saeyoung Oh; Jong Kim
- Source
- Information Security Applications ISBN: 9783030179816
WISA
- Subject
- 010302 applied physics
Reverse engineering
Hardware_MEMORYSTRUCTURES
Computer science
02 engineering and technology
computer.software_genre
01 natural sciences
020202 computer hardware & architecture
Memory address
Bit (horse)
Computer engineering
Mapping algorithm
0103 physical sciences
0202 electrical engineering, electronic engineering, information engineering
Row
computer
Dram
- Language
Rowhammer attacks intentionally induce bit flips to corrupt victim’s data whose integrity must be guaranteed. To perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighboring rows of target data. In DRAM, however, the physical addresses of neighboring rows are not always contiguous even if they are located before or after a target row. Hence, it is important to know the mapping algorithm which maps between physical addresses and physical row indexes not only for an attack but also for protection.