Attacking and Defending Emerging Computer Systems Using The Memory Remanence Effect

@inproceedings{Rahmati2017AttackingAD,
  title={Attacking and Defending Emerging Computer Systems Using The Memory Remanence Effect},
  author={Amir Rahmati},
  year={2017}
}
To achieve this, we show how time-keeping, anonymity, and authenticity can be affected by memory remanence. In terms of attacks, we explore the deanonymizing effect of Approximate Computing in the context of approximate memory in Probable Cause. We show how any data passing through an approximate memory will be watermarked with a device specific tag that can point the attacker back to the device. In terms of defenses, we first present TARDIS; an approach to provide a notion of time for… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 103 REFERENCES

Gartner says 6.4 billion connected ”things” will be in use in 2016, up 30 percent

Gartner, Inc
  • 2015

Approximate storage in solid-state memories

  • 2013 46th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)
  • 2013

Complementary IBS: Application specific error correction for PUFs

  • 2012 IEEE International Symposium on Hardware-Oriented Security and Trust
  • 2012