Главная
Study mode:
on
1
Intro
2
Landscape of Rowhammer
3
Rowhammer Primer
4
Two Key Requirements for Rowhammer Testing
5
Challenges in Generating Highest Rate of ACTS
6
Typical Rowhammer Instruction Sequence
7
Rate of ACTs from Previous Instruction Sequences
8
Our Near-Optimal Instruction Sequence on Skylake
9
Determining Physically Adjacent Rows
10
Previous Reverse-Engineering Methodology Relies on Rowhammer
11
Mount a Devastating Rowhammer by Masking Refreshes (REF)
12
Fault Injector that Masks Refresh Commands
13
Our Complete Hardware Stack
14
Row Adjacency Map
15
Key Takeaways
16
An end-to-end methodology to test if any cloud server is susceptible to Rowhammer
Description:
Explore an end-to-end methodology for cloud providers to assess their servers' vulnerability to Rowhammer attacks in this 17-minute IEEE conference talk. Learn about the challenges in creating worst-case DRAM testing conditions and discover a novel instruction sequence that leverages microarchitectural side-effects to "hammer" DRAM at near-optimal rates on modern Intel platforms. Gain insights into the development of a DDR4 fault injector for reverse engineering row adjacency and understand why DRAM rows may not always follow a linear map. Delve into the landscape of Rowhammer, key testing requirements, and the limitations of previous instruction sequences used in Rowhammer attacks. Uncover the importance of masking refresh commands and examine the complete hardware stack used in this comprehensive approach to evaluating Rowhammer susceptibility in cloud environments.

Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers

IEEE
Add to list
0:00 / 0:00