[1]
Y. Kim, R. Daly, J. Kim, C. Fallin, J. H. Lee, D. Lee, C. Wilkerson, K. Lai, and O. Mutlu, Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors, in Proc. 41st Int. Symp. Computer Architecture, Minneapolis, MN, USA, 2014, pp. 361-372.
[3]
M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, and M. Hamburg, Meltdown: Reading kernel memory from user space, in Proc. USENIX Security Symp., Baltimore, MD, USA, 2018, pp. 973-990.
[5]
Z. Y. Wu, Z. Xu, and H. N. Wang, Whispers in the hyper-space: High-bandwidth and reliable covert channel attacks inside the cloud, IEEE/ACM Trans. Network., vol. 23, no. 2, pp. 603-615, 2015.
[7]
Y. Xiao, X. K. Zhang, Y. Q. Zhang, and R. Teodorescu, One bit flips, one cloud flops: Cross-VM row hammer attacks and privilege escalation, in Proc. 25th USENIX Security Symp., Austin, TX, USA, 2016, pp. 19-35.
[8]
K. Razavi, B. Gras, E. Bosman, B. Preneel, C. Giuffrida, and H. Bos, Flip Feng Shui: Hammering a needle in the software stack, in Proc. 25th USENIX Security Symp., Austin, TX, USA, 2016, pp. 1-18.
[10]
Y. Cheng, Z. Zhang, S. Nepal, Still hammerable and exploitable: On the effectiveness of software-only physical kernel isolation, arXiv preprint arXiv: 1802.07060, 2018.
[11]
D. Gruss, M. Lipp, M. Schwarz, D. Genkin, J. Juffinger, S. O’Connell, and W. Schoechl, Another Flip in the wall of rowhammer defenses, in Proc. 2018 IEEE Symp. Security and Privacy, San Francisco, CA, USA, 2018, pp. 245-261.
[12]
X. H. Han, S. Wei, J. Y. Ye, Z. Chao, and Z. Y. Ye, Detect use-after-free vulnerabilities in binaries, (in Chinese), J. Tsinghua Univ. (Sci. Technol.), vol. 57, no. 10, pp. 1022-1029, 2017.
[13]
B. J. Cui, F. W. Wang, T. Guo, and B. J. Liu, Research of taint-analysis based API in-memory fuzzing tests, (in Chinese), J. Tsinghua Univ. (Sci. Technol.), vol. 56, no. 1, pp. 7-13, 2016.
[14]
A. Amaya, H. Gomez, and E. Roa, Mitigating row hammer attacks based on dummy cells in DRAM, in Proc. 2017 IEEE Int. Conf. Consumer Electronics, Las Vegas, NV, USA, 2017, pp. 442-443.
[15]
G. Irazoqui, T. Eisenbarth, and B. Sunar, MASCAT: Preventing microarchitectural attacks before distribution, in Proc. 8th ACM Conf. Data and Application Security and Privacy, New York, NY, USA, 2018, pp. 377-388.
[17]
Z. B. Aweke, S. F. Yitbarek, R. Qiao, R. Das, M. Hicks, Y. Oren, and T. Austin, ANVIL: Software-based protection against next-generation rowhammer attacks, in Proc. Twenty-First Int. Conf. Architectural Support for Programming Languages and Operating Systems, Atlanta, GA, USA, 2016, pp. 743-755.
[18]
V. Van Der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice, G. Vigna, H. Bos, K. Razavi, and C. Giuffrida, Drammer: Deterministic rowhammer attacks on mobile platforms, in Proc. 2016 ACM SIGSAC Conf. Computer and Communications Security, New York, NY, USA, 2016, pp. 1675-1689.
[19]
F. Brasser, L. Davi, D. Gens, C. Liebchen, and A. R. Sadeghi , Can’t touch this: Practical and generic software-only defenses against rowhammer attacks, arXiv preprint arXiv: 1611.08396, 2017.
[22]
P. Pessl, D. Gruss, C. Maurice, M. Schwarz, and S. Mangard, DRAMA: Exploiting DRAM addressing for cross-CPU attacks, in Proc. USENIX Security Symp., Austin, TX, USA, 2016, pp. 565-581.