作者: Rui Qiao , Mark Seaborn
关键词: Code (cryptography) 、 Reliability (computer networking) 、 x86 、 Random access memory 、 Dram 、 Row 、 Task (project management) 、 Computer science 、 Virtual memory 、 Computer security
摘要: Rowhammer is a hardware bug identified in recent commodity DRAMs: repeated row activations can cause bit flips adjacent rows. has been recognized as both reliability and security issue. And it classic example that layered abstractions trust (in this case, virtual memory) be broken from level. Previous rowhammer attacks either rely on rarely used special instructions or complicated memory access patterns. In paper, we propose new approach for based x86 non-temporal instructions. This bypasses existing defense much less constrained more challenging task: remote attacks, i.e., triggering with existing, benign code. Moreover, extend our identify libc memset memcpy functions primitive. Our discussions protection suggest critical to understand threat able defend depth.