DC Field | Value | Language |
---|---|---|
dc.contributor.author | 오세영 | - |
dc.date.accessioned | 2022-03-29T03:17:11Z | - |
dc.date.available | 2022-03-29T03:17:11Z | - |
dc.date.issued | 2019 | - |
dc.identifier.other | OAK-2015-08743 | - |
dc.identifier.uri | http://postech.dcollection.net/common/orgView/200000176339 | ko_KR |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/111548 | - |
dc.description | Master | - |
dc.description.abstract | To perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighboring rows of target data. In DRAM, however, the physical addresses of neighboring rows are not always contiguous even if they are located before or after a target row. Hence, it is important to know the mapping algorithm which maps between physical addresses and physical row indexes not only for an attack but also for protection. In this thesis, we introduce a method to reverse engineer the exact mapping algorithm and demonstrate that the assumption in previous rowhammer work is faulty. In addition, we introduce a novel and efficient rowhammer method and improve existing mitigations that have a security hole caused by the faulty assumption. Finally, we evaluate the effectiveness of the proposed attack and show that the improved mitigations almost perfectly defend against rowhammer attacks. | - |
dc.language | eng | - |
dc.publisher | 포항공과대학교 | - |
dc.title | Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms | - |
dc.type | Thesis | - |
dc.contributor.college | 일반대학원 컴퓨터공학과 | - |
dc.date.degree | 2019- 2 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.