2016 IEEE Symposium on Security and Privacy (SP) 2016
DOI: 10.1109/sp.2016.63
|View full text |Cite
|
Sign up to set email alerts
|

Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
180
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 154 publications
(233 citation statements)
references
References 18 publications
0
180
0
1
Order By: Relevance
“…Early projects confronted this challenges by picked random addresses following probabilistic approaches [5,[9][10][11]. In latest works, the exact physical address mapping of all the banks should be known in order to access both rows that are directly above and below the victim one to mount a double-side rowhammer attack.…”
Section: Triggering Rowhammermentioning
confidence: 99%
See 2 more Smart Citations
“…Early projects confronted this challenges by picked random addresses following probabilistic approaches [5,[9][10][11]. In latest works, the exact physical address mapping of all the banks should be known in order to access both rows that are directly above and below the victim one to mount a double-side rowhammer attack.…”
Section: Triggering Rowhammermentioning
confidence: 99%
“…Such addresses are accessed one after the other so as to force the eviction of our aggressor row. This can be achieved through the use of a timing attack to find out the eviction set [12,17,18], or by using reverse engineering study of the Device under attack, focusing on manipulating the complex hash functions used by modern Intel processor to further partition the cache into slices [9]. On another approach proposed in [1], rowhammer is triggered with non-temporal store instructions, specifically libc functions, taking advantages of its cache bypass characteristic.…”
Section: Managing To Activate Rows In Each Bank Fast Enough To Triggementioning
confidence: 99%
See 1 more Smart Citation
“…Although ASLR has a wider scope than these schemes (e.g., use-after-free bugs), it can only provide probabilistic safety at best, whereas Delta Pointers provide deterministic (spatial) memory safety guarantees on the upper bound. Because of its probabilistic nature, ASLR has proven to be easily circumventable by memory massaging [16,33] or side channels [5,15,17] whereas this is not possible for deterministic defenses such as Delta Pointers. Moreover, the impact of address space reduction is limited in certain application domains.…”
Section: Pointermentioning
confidence: 99%
“…One of the most widely implemented techniques is Address Space Layout Randomization (ASLR) [29], which aims at preventing the attacker from gaining crucial information about the program's memory structure. However, researchers showed that ASLR is vulnerable to application-specific information leaks [35] along with OSbased [6] and hardware-based [15], [18] side-channels. Another popular mitigation is Write XOR Execute (W⊕X), also called Data Execution Prevention (DEP) [26] in Windows.…”
Section: Introductionmentioning
confidence: 99%