Corpus ID: 231985901

SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh

@article{Zhang2021SoftTRRPP,
  title={SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh},
  author={Zhi Zhang and Yueqiang Cheng and Minghua Wang and Wei He and W. Wang and S. Nepal and Yansong Gao and Kang Li and Zhe Wang and Chenggang Wu},
  journal={ArXiv},
  year={2021},
  volume={abs/2102.10269}
}
Rowhammer attacks that corrupt level-1 page tables to gain kernel privilege are the most detrimental to system security and hard to mitigate. However, recently proposed software-only mitigations are not effective against such kernel privilege escalation attacks. In this paper, we propose an effective and practical softwareonly defense, called SoftTRR, to protect page tables from all existing rowhammer attacks on x86. The key idea of SoftTRR is to refresh the rows occupied by page tables when a… Expand

References

SHOWING 1-10 OF 47 REFERENCES
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks
  • 19
  • Highly Influential
  • PDF
Another Flip in the Wall of Rowhammer Defenses
  • 82
  • PDF
Protecting Page Tables from RowHammer Attacks using Monotonic Pointers in DRAM True-Cells
  • 10
  • Highly Influential
  • PDF
RAMBleed: Reading Bits in Memory Without Accessing Them
  • 34
  • PDF
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks
  • 7
  • Highly Influential
TWiCe: Preventing Row-hammering by Exploiting Time Window Counters
  • 15
  • PDF
TRRespass: Exploiting the Many Sides of Target Row Refresh
  • 29
  • PDF
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks
  • 42
  • PDF
...
1
2
3
4
5
...