One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation
暂无分享,去创建一个
Yuan Xiao | Yinqian Zhang | Radu Teodorescu | Xiaokuan Zhang | Yinqian Zhang | Xiaokuan Zhang | R. Teodorescu | Yuan Xiao
[1] Yaozu Dong. Extending Xen* with IntelŴVirtualization Technology , 2006 .
[2] Stefan Mangard,et al. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript , 2015, DIMVA.
[3] Mark Lanteigne. How Rowhammer Weakness , 2016 .
[4] Yaozu Dong,et al. Extending Xen* with Intel Virtualization Technology , 2006 .
[5] Barbara P. Aichinger,et al. DDR memory errors caused by Row Hammer , 2015, 2015 IEEE High Performance Extreme Computing Conference (HPEC).
[6] David Chisnall,et al. The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series) , 2007 .
[7] Bruce Jacob,et al. Modern dram memory systems: performance analysis and scheduling algorithm , 2005 .
[8] Gil Neiger,et al. Intel virtualization technology , 2005, Computer.
[9] Onur Mutlu,et al. Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems , 2007, USENIX Security Symposium.
[10] Chris Fallin,et al. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[11] Stefan Mangard,et al. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks , 2015, USENIX Security Symposium.
[12] Dae-Hyun Kim,et al. Architectural Support for Mitigating Row Hammering in DRAM Memories , 2015, IEEE Computer Architecture Letters.
[13] Wei-Fen Lin,et al. Reducing DRAM latencies with an integrated memory hierarchy design , 2001, Proceedings HPCA Seventh International Symposium on High-Performance Computer Architecture.
[14] Gernot Heiser,et al. Last-Level Cache Side-Channel Attacks are Practical , 2015, 2015 IEEE Symposium on Security and Privacy.
[15] Herbert Bos,et al. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[16] Varghese George,et al. Power management of the third generation intel core micro architecture formerly codenamed ivy bridge , 2012, 2012 IEEE Hot Chips 24 Symposium (HCS).
[17] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[18] Michael M. Swift,et al. A Placement Vulnerability Study in Multi-Tenant Public Clouds , 2015, USENIX Security Symposium.