{"title":"精确的Rowhammer:抑制Rowhammer攻击时不需要的位翻转","authors":"Sangwoo Ji, Youngjoo Ko, Saeyoung Oh, Jong Kim","doi":"10.1145/3321705.3329811","DOIUrl":null,"url":null,"abstract":"In recent studies, sophisticated attack vectors that use a Rowhammer bug have been developed. These attacks are dangerous, given that they can corrupt data stored in arbitrary memory rows without accessing them. Successful Rowhammer attacks require to flip data of the target cell. However, non-target cells are also corrupted by the attacks. Such unwanted bit flips can lead to unexpected consequences such as an attack failure and a system crash. We propose a novel Rowhammer method, namely, Pinpoint rowhammer, which flips the target bit while suppressing unwanted bit flips. The basic idea is the use of an effective data pattern for the target bit and ineffective data patterns for non-target bits. We evaluate the proposed method by conducting 107,965 attack instances on four different dynamic random-access memory (DRAM) modules. The proposed method increases the attack success rate from 28.9% to 72.4%, when compared with the state-of-the-art method (double-sided Rowhammer). In addition, the proposed method suppresses 99.7% of the unwanted vulnerable cells.","PeriodicalId":189657,"journal":{"name":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":"{\"title\":\"Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks\",\"authors\":\"Sangwoo Ji, Youngjoo Ko, Saeyoung Oh, Jong Kim\",\"doi\":\"10.1145/3321705.3329811\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent studies, sophisticated attack vectors that use a Rowhammer bug have been developed. These attacks are dangerous, given that they can corrupt data stored in arbitrary memory rows without accessing them. Successful Rowhammer attacks require to flip data of the target cell. However, non-target cells are also corrupted by the attacks. Such unwanted bit flips can lead to unexpected consequences such as an attack failure and a system crash. We propose a novel Rowhammer method, namely, Pinpoint rowhammer, which flips the target bit while suppressing unwanted bit flips. The basic idea is the use of an effective data pattern for the target bit and ineffective data patterns for non-target bits. We evaluate the proposed method by conducting 107,965 attack instances on four different dynamic random-access memory (DRAM) modules. The proposed method increases the attack success rate from 28.9% to 72.4%, when compared with the state-of-the-art method (double-sided Rowhammer). In addition, the proposed method suppresses 99.7% of the unwanted vulnerable cells.\",\"PeriodicalId\":189657,\"journal\":{\"name\":\"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"20\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3321705.3329811\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3321705.3329811","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks
In recent studies, sophisticated attack vectors that use a Rowhammer bug have been developed. These attacks are dangerous, given that they can corrupt data stored in arbitrary memory rows without accessing them. Successful Rowhammer attacks require to flip data of the target cell. However, non-target cells are also corrupted by the attacks. Such unwanted bit flips can lead to unexpected consequences such as an attack failure and a system crash. We propose a novel Rowhammer method, namely, Pinpoint rowhammer, which flips the target bit while suppressing unwanted bit flips. The basic idea is the use of an effective data pattern for the target bit and ineffective data patterns for non-target bits. We evaluate the proposed method by conducting 107,965 attack instances on four different dynamic random-access memory (DRAM) modules. The proposed method increases the attack success rate from 28.9% to 72.4%, when compared with the state-of-the-art method (double-sided Rowhammer). In addition, the proposed method suppresses 99.7% of the unwanted vulnerable cells.