Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

time 15.0 min to 200.0 min

biblio

Visible to the public Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries

Submitted by grigby1 on Fri, 10/30/2020 - 12:15pm
  • Scalability
  • page cache eviction
  • parallel processing
  • powerful privilege-escalation attacks
  • program diagnostics
  • proof-of-concept Waylaying algorithm
  • pubcrawl
  • Random access memory
  • rowhammer attacks
  • Rowhammer bug
  • running time
  • microarchitectural security threat
  • security
  • security of data
  • system memory
  • system monitoring
  • time 15.0 min to 200.0 min
  • unprivileged instructions
  • unprivileged posix fadvise API
  • victim binary
  • Waylaying algorithm
  • Waylaying method
  • I-O Systems
  • application program interfaces
  • binary relocation step
  • cache storage
  • Computer bugs
  • disk
  • DRAM chips
  • Dynamic Random Access Memory cells
  • exploitable physical addresses
  • Hardware
  • Heuristic algorithms
  • advanced Memway algorithm
  • i-o systems security
  • in-memory swapping
  • in-memory waylaying acceleration
  • input-output programs
  • Kernel
  • Linux
  • Linux page cache
  • Linux tmpfs
  • mainstream platforms
  • Memway+fadvise relocation scheme

Terms of Use  |  ©2023. CPS-VO