Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework

01/11/2019
by   Xiaoxuan Lou, et al.
0

Rowhammer is a hardware-based bug that allows the attacker to modify the data in the memory without accessing it, just repeatedly and frequently accessing (or hammering) physically adjacent memory rows. So that it can break the memory isolation between processes, which is seen as the cornerstone of modern system security, exposing the sensitive data to unauthorized and imperceptible corruption. A number of previous works have leveraged the rowhammer bug to achieve various critical attacks. In this work, we propose a unified reference framework for analyzing the rowhammer attacks, indicating three necessary factors in a practical rowhammer attack: the attack origin, the intended implication and the methodology. Each factor includes multiple primitives, the attacker can select primitives from three factors to constitute an effective attack. In particular, the methodology further summarizes all existing attack techniques, that are used to achieve its three primitives: Location Preparation (LP), Rapid Hammering (RH), and Exploit Verification (EV). Based on the reference framework, we analyze all previous rowhammer attacks and corresponding countermeasures. Our analysis shows that how primitives in different factors are combined and used in previous attacks, and thus points out new possibility of rowhammer attacks, enabling proactive prevention before it causes harm. Under the framework, we propose a novel expressive rowhammer attack that is capable of accumulating injected memory changes and achieving rich attack semantics. We conclude by outlining future research directions.

READ FULL TEXT
research
08/14/2019

A note on the Uniformed Patroller Game

Patrolling Games were introduced by Alpern, Morton and Papadaki (2011) t...
research
09/13/2023

MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems

Speaker Verification (SV) is widely deployed in mobile systems to authen...
research
11/26/2020

Attacks on Lightweight Hardware-Based Security Primitives

In today's digital age, the ease of data collection, transfer, and stora...
research
12/03/2019

An Off-Chip Attack on Hardware Enclaves via the Memory Bus

This paper shows how an attacker can break the confidentiality of a hard...
research
02/20/2018

Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation

All the state-of-the-art rowhammer attacks can break the MMU-enforced in...
research
07/27/2023

SEV-Step: A Single-Stepping Framework for AMD-SEV

The ever increasing popularity and availability of Trusted Execution Env...
research
12/15/2021

00

What is the funniest number in cryptography (Episode 2)? 0 [1]. The reas...

Please sign up or login with your details

Forgot password? Click here to reset