Główne pojęcia
Novel software-based low-level layer for memory protection against physical attacks.
Streszczenie
The article discusses the vulnerabilities of memory to physical attacks, such as bit-flips, and the limitations of existing defense solutions. It proposes a novel software-based approach to protect vulnerable memory regions targeted by physical attack vectors. The research explores the balance between computational difficulty and data integrity gains, emphasizing the need for selective computational work on critical data regions. The study highlights the prevalence of hardware faults in consumer space and proposes a Memory Safe Management System (MSMS) to enhance system security from various disturbance-based error attacks.
Statystyki
"DDR5 SDRAM, JEDEC, Jul 2020 2020."
"ECCPLOIT: ECC MEMORY VULNERABLE TO ROWHAMMER ATTACKS AFTER ALL," in eccploit, SNSG, Amsterdam, The Netherlands: Vrije Universiteit, 2019.
"Using memory errors to attack a virtual machine," in Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405): IEEE Comput. Soc.
"Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors," in 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA), 2014-06-01 2014: IEEE.
Cytaty
"Research has explored self-healing OSs that minimize fault-induced downtime and halts."
"Our solution will reduce OS hard-faults and enhance system security from RowHammer, Blacksmith, and other disturbance-based error attacks."