Open Access System for Information Sharing

Login Library

 

Thesis
Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.author오세영-
dc.date.accessioned2022-03-29T03:17:11Z-
dc.date.available2022-03-29T03:17:11Z-
dc.date.issued2019-
dc.identifier.otherOAK-2015-08743-
dc.identifier.urihttp://postech.dcollection.net/common/orgView/200000176339ko_KR
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/111548-
dc.descriptionMaster-
dc.description.abstractTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighboring rows of target data. In DRAM, however, the physical addresses of neighboring rows are not always contiguous even if they are located before or after a target row. Hence, it is important to know the mapping algorithm which maps between physical addresses and physical row indexes not only for an attack but also for protection. In this thesis, we introduce a method to reverse engineer the exact mapping algorithm and demonstrate that the assumption in previous rowhammer work is faulty. In addition, we introduce a novel and efficient rowhammer method and improve existing mitigations that have a security hole caused by the faulty assumption. Finally, we evaluate the effectiveness of the proposed attack and show that the improved mitigations almost perfectly defend against rowhammer attacks.-
dc.languageeng-
dc.publisher포항공과대학교-
dc.titleReliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms-
dc.typeThesis-
dc.contributor.college일반대학원 컴퓨터공학과-
dc.date.degree2019- 2-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Views & Downloads

Browse