Etd

Investigating the Practical Limits of Rowhammer Attacks

Public Deposited

The objective of this thesis is to conduct an in-depth analysis of the Rowhammer phenomenon. Rowhammer is a specific issue that results in the selective corruption of data within DRAM memories, triggered by specific memory access patterns. Notably, Rowhammer can manifest even with read-only memory accesses, potentially leading to data alterations within regions designated as read-only memory. This vulnerability poses a significant challenge to the integrity of various security mechanisms reliant on read-only permissions, such as user space-kernel space separation, process sandboxing, and the use of asymmetric cryptographic keys. Also crafting a practical Rowhammer attack often involves a deep understanding of the target system’s memory layout, which can be complex and hard to reverse engineer. Cloud service providers are apprehensive about the potential significant risk that Rowhammer presents to their server infrastructure. However, they currently lack a structured approach for assessing the vulnerability of the DRAM employed in their servers to Rowhammer attacks. This thesis introduces a comprehensive methodology designed to assess whether cloud servers are susceptible to these attacks, offering an end-to-end solution for this critical concern.

Creator
Contributors
Degree
Unit
Publisher
Identifier
  • etd-115190
Keyword
Advisor
Committee
Defense date
Year
  • 2023
Date created
  • 2023-12-14
Resource type
Source
  • etd-115190
Rights statement
Last modified
  • 2024-01-25

Relations

In Collection:

Items

Items

Permanent link to this page: https://digital.wpi.edu/show/z316q581z