Completed
Preventing Rowhammer attacks in hardware (1/3)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Another Flip in the Row
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 How reading from DRAM works
- 3 Timing difference
- 4 How widespread is the issue?
- 5 Requirements
- 6 Access techniques
- 7 Physical addresses and DRAM
- 8 How to exploit random bit flips?
- 9 Strategy: Modify instructions
- 10 Page Table Entries
- 11 Page Table Manipulation
- 12 Post-Rowhammer Exploitation
- 13 Bit Flips + Page Deduplication
- 14 Mitigations
- 15 What about ECC?
- 16 Preventing Rowhammer attacks in hardware (1/3)
- 17 Preventing Rowhammer attacks in software
- 18 Detecting Rowhammer attacks
- 19 Defenses Overview
- 20 How to hammer?
- 21 Single-sided hammering
- 22 Double-sided hammering
- 23 Hammering techniques
- 24 One-location hammering
- 25 Memory-Controller Policies
- 26 How well does it work?
- 27 Opcode Flipping - Conditional Jump
- 28 Page Cache
- 29 Memory Waylaying
- 30 SGX Encrypted Memory
- 31 (Ab)using SGX Protection
- 32 Just comparing some performance numbers...
- 33 Exploiting Nethammer Bit Flips