A new approach for rowhammer attacks

  title={A new approach for rowhammer attacks},
  author={Rui Qiao and Mark Seaborn},
  journal={2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)},
Rowhammer is a hardware bug identified in recent commodity DRAMs: repeated row activations can cause bit flips in adjacent rows. Rowhammer has been recognized as both a reliability and security issue. And it is a classic example that layered abstractions and trust (in this case, virtual memory) can be broken from hardware level. Previous rowhammer attacks either rely on rarely used special instructions or complicated memory access patterns. In this paper, we propose a new approach for rowhammer… CONTINUE READING
Highly Cited
This paper has 24 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.
19 Citations
10 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 19 extracted citations


Publications referenced by this paper.
Showing 1-10 of 10 references

Exploiting the DRAM rowhammer bug to gain kernel privileges

  • M. Seaborn, T. Dullien
  • http://googleprojectzero.blogspot.com/2015/03…
  • 2015
Highly Influential
6 Excerpts


  • JEDEC. Standard No
  • LPDDR4 Specification. Nov.
  • 2015
1 Excerpt

How physical addresses map to rows and banks in DRAM. http://lackingrhoticity.blogspot.com/2015/05/ how-physical-addresses-map-to-rows-and-banks.html

  • M. Seaborn
  • 2015
2 Excerpts

These are not your grand daddy’s CPU performance counters: CPU hardware performance counters for security

  • N. Herath, A. Fogh
  • Black Hat,
  • 2015
1 Excerpt


  • JEDEC. Standard No
  • DDR4 SDRAM Specification. Nov.
  • 2013
1 Excerpt


  • JEDEC. Standard No
  • DDR3 SDRAM Specification. July
  • 2012
1 Excerpt

Similar Papers

Loading similar papers…