Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
暂无分享,去创建一个
Yanick Fratantonio | Giovanni Vigna | Herbert Bos | Cristiano Giuffrida | Victor van der Veen | Kaveh Razavi | Daniel Gruss | Martina Lindorfer | Clémentine Maurice | H. Bos | Giovanni Vigna | Kaveh Razavi | Cristiano Giuffrida | D. Gruss | Clémentine Maurice | Martina Lindorfer | Y. Fratantonio | V. V. D. Veen | G. Vigna
[1] Yuan Xiao,et al. One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation , 2016, USENIX Security Symposium.
[2] Mel Gorman,et al. Understanding the Linux Virtual Memory Manager , 2004 .
[3] Juanru Li,et al. From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel , 2015, CCS.
[4] Stefan Mangard,et al. ARMageddon: Cache Attacks on Mobile Devices , 2015, USENIX Security Symposium.
[5] Herbert Bos,et al. Flip Feng Shui: Hammering a Needle in the Software Stack , 2016, USENIX Security Symposium.
[6] M. Lanteigne. A Tale of Two Hammers A Brief Rowhammer , 2016 .
[7] Herbert Bos,et al. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[8] Reetuparna Das,et al. ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks , 2016, ASPLOS.
[9] Angelos D. Keromytis,et al. ret2dir: Rethinking Kernel Isolation , 2014, USENIX Security Symposium.
[10] Song Liu,et al. Flikker: saving DRAM refresh-power through critical data partitioning , 2011, ASPLOS XVI.
[11] Barbara P. Aichinger,et al. DDR memory errors caused by Row Hammer , 2015, 2015 IEEE High Performance Extreme Computing Conference (HPEC).
[12] Bruce Jacob,et al. DRAM Refresh Mechanisms, Penalties, and Trade-Offs , 2016, IEEE Transactions on Computers.
[13] Stefan Mangard,et al. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript , 2015, DIMVA.
[14] Eric Rotenberg,et al. Retention-aware placement in DRAM (RAPID): software methods for quasi-non-volatile DRAM , 2006, The Twelfth International Symposium on High-Performance Computer Architecture, 2006..
[15] Chris Fallin,et al. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[16] Stefan Mangard,et al. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks , 2015, USENIX Security Symposium.
[17] Wen Xu,et al. Own Your Android! Yet Another Universal Root , 2015, WOOT.
[18] David Seal,et al. ARM Architecture Reference Manual , 2001 .
[19] Rui Qiao,et al. A new approach for rowhammer attacks , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[20] Hang Zhang,et al. Android ION Hazard: the Curse of Customizable Memory Management System , 2016, CCS.