2022 IEEE Symposium on Security and Privacy (SP) 2022
DOI: 10.1109/sp46214.2022.9833802
|View full text |Cite
|
Sign up to set email alerts
|

SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…The attacker locates the gadget's virtual address in the address space of victim's, (23,24) subsequently conducts indirect branches for mentioned address in order to confuse the BTB. The address space of the attacker is used for this training.…”
Section: Exploiting Indirect Branches (Variant 2 (V2))mentioning
confidence: 99%
“…The attacker locates the gadget's virtual address in the address space of victim's, (23,24) subsequently conducts indirect branches for mentioned address in order to confuse the BTB. The address space of the attacker is used for this training.…”
Section: Exploiting Indirect Branches (Variant 2 (V2))mentioning
confidence: 99%
“…Attackers can remotely gain administrative privileges through this vulnerability and then execute malicious instructions with those privileges. Buffer overflow has been identified as one of the most common and dangerous security vulnerabilities to date [7]. Many detection and mitigation techniques have been developed and deployed to reduce the likelihood of buffer overflow attacks [8][9][10].…”
Section: Related Workmentioning
confidence: 99%
“…Some forms of Rowhammer attacks (Bhattacharya and Mukhopadhyay, 2016;Kwong et al, 2020;Weissman et al, 2019) work on extracting RSA key; others (Rakin et al, 2022) show how weights of a Deep Neural Network (DNN) can be leaked and yet others show how the accuracy of DNN can be diminished using Rowhammer attack (Hong et al, 2019;Yao et al, 2020). SpecHammer (Tobah et al, 2022), a row of hammerassisted specter attacks, was able to bypass current specter defenses. Rowhammer can also be the source of Denial of Service (DoS) attacks; (Lipp et al, 2020) implemented network-based attacks on remote systems to compromise system security or cause Denial of Service (DoS).…”
Section: Rowhammer Exploitationsmentioning
confidence: 99%