Reverse Engineering Intel DRAM Addressing and Exploitation

@article{Pessl2015ReverseEI,
  title={Reverse Engineering Intel DRAM Addressing and Exploitation},
  author={Peter Pessl and Daniel Gruss and Cl{\'e}mentine Maurice and Stefan Mangard},
  journal={CoRR},
  year={2015},
  volume={abs/1511.08756}
}
In this paper, we present a method to reverse engineer DRAM addressing functions based on a physical bus probing. Second, we present an automatic and generic method to reverse engineer DRAM addressing functions merely from performing a timing attack. This timing attack can be performed on any system without privileges and even in virtual machines to derive information about the mapping to physical DRAM channels, ranks and banks. We reversed the complex adressing functions on a diverse set of… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 21 references

How physical addresses map to rows and banks in DRAM

  • M. SEABORN
  • http://lackingrhoticity.blogspot.com/ 2015/05/how…
  • 2015
Highly Influential
5 Excerpts

AND HALBERT, J. Row hammer monitoring based on stored row hammer threshold

  • K. BAINS
  • US Patent App
  • 2014
Highly Influential
7 Excerpts

Exploiting the DRAM rowhammer bug to gain kernel privileges

  • M. SEABORN
  • http://googleprojectzero.blogspot. com/2015/03…
  • 2015
1 Excerpt

Similar Papers

Loading similar papers…